Conferences in DBLP
Taizo Shirai , Bart Preneel On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:1-15 [Conf ] Phillip Rogaway Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:16-31 [Conf ] Craig Gentry , Zulfikar Ramzan Eliminating Random Permutation Oracles in the Even-Mansour Cipher. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:32-47 [Conf ] Mihir Bellare , Adriana Palacio Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:48-62 [Conf ] Duong Hieu Phan , David Pointcheval OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:63-77 [Conf ] Adi Shamir Stream Ciphers: Dead or Alive? [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:78- [Conf ] Luca Breveglieri , Alessandra Cherubini , Marco Macchetti On the Generalized Linear Equivalence of Functions Over Finite Fields. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:79-91 [Conf ] Kazumaro Aoki , Hiroki Ueda Sieving Using Bucket Sort. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:92-102 [Conf ] Eonkyung Lee Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:103-118 [Conf ] Berry Schoenmakers , Pim Tuyls Practical Two-Party Computation Based on the Conditional Gate. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:119-136 [Conf ] Markus Bläser , Andreas Jakoby , Maciej Liskiewicz , Bodo Manthey Privacy in Non-private Environments. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:137-151 [Conf ] Bartosz Przydatek , Reto Strobl Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:152-169 [Conf ] Ron Steinfeld , Huaxiong Wang , Josef Pieprzyk Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:170-186 [Conf ] Palash Sarkar Masking Based Domain Extenders for UOWHFs: Bounds and Constructions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:187-200 [Conf ] Deukjo Hong , Bart Preneel , Sangjin Lee Higher Order Universal One-Way Hash Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:201-213 [Conf ] Frédéric Muller The MD2 Hash Function Is Not One-Way. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:214-229 [Conf ] Muxiang Zhang New Approaches to Password Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:230-244 [Conf ] Hyun-Jeong Kim , Su-Mi Lee , Dong Hoon Lee Constant-Round Authenticated Group Key Exchange for Dynamic Groups. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:245-259 [Conf ] Tatsuyuki Matsushita , Hideki Imai A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:260-275 [Conf ] Rosario Gennaro , Darren Leigh , Ravi Sundaram , William S. Yerazunis Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:276-292 [Conf ] Claude Castelluccia , Stanislaw Jarecki , Gene Tsudik Secret Handshakes from CA-Oblivious Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:293-307 [Conf ] Isamu Teranishi , Jun Furukawa , Kazue Sako k-Times Anonymous Authentication (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:308-322 [Conf ] Claus Diem The XL-Algorithm and a Conjecture from Commutative Algebra. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:323-337 [Conf ] Gwénolé Ars , Jean-Charles Faugère , Hideki Imai , Mitsuru Kawazoe , Makoto Sugita Comparison Between XL and Gröbner Basis Algorithms. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:338-353 [Conf ] Jean Monnerat , Serge Vaudenay Generic Homomorphic Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:354-371 [Conf ] Lan Nguyen , Reihaneh Safavi-Naini Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:372-386 [Conf ] In-Sok Lee , Woo-Hwan Kim , Daesung Kwon , Sangil Nahm , Nam-Seok Kwak , Yoo-Jin Baek On the Security of MOR Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:387-400 [Conf ] Aggelos Kiayias , Moti Yung Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:401-416 [Conf ] Feng Bao Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:417-429 [Conf ] Ho-Ick Suk Information Security in Korea IT839 Strategy. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:430-431 [Conf ] Thomas Baignères , Pascal Junod , Serge Vaudenay How Far Can We Go Beyond Linear Cryptanalysis? [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:432-450 [Conf ] Sébastien Kunz-Jacques , Frédéric Muller , Frédéric Valette The Davies-Murphy Power Attack. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:451-467 [Conf ] Joydip Mitra , Palash Sarkar Time-Memory Trade-Off Attacks on Multiplications and T-Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:468-482 [Conf ] Yi Lu 0002 , Serge Vaudenay Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:483-499 [Conf ] Ahto Buldas , Märt Saarepera On Provably Secure Time-Stamping Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:500-514 [Conf ] Ian F. Blake , Vladimir Kolesnikov Strong Conditional Oblivious Transfer and Computing on Intervals. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:515-529 [Conf ] Giovanni Di Crescenzo , Giuseppe Persiano , Ivan Visconti Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:530-544 [Conf ]