The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
2004 (conf/asiacrypt/2004)

  1. Taizo Shirai, Bart Preneel
    On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:1-15 [Conf]
  2. Phillip Rogaway
    Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:16-31 [Conf]
  3. Craig Gentry, Zulfikar Ramzan
    Eliminating Random Permutation Oracles in the Even-Mansour Cipher. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:32-47 [Conf]
  4. Mihir Bellare, Adriana Palacio
    Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:48-62 [Conf]
  5. Duong Hieu Phan, David Pointcheval
    OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:63-77 [Conf]
  6. Adi Shamir
    Stream Ciphers: Dead or Alive? [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:78- [Conf]
  7. Luca Breveglieri, Alessandra Cherubini, Marco Macchetti
    On the Generalized Linear Equivalence of Functions Over Finite Fields. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:79-91 [Conf]
  8. Kazumaro Aoki, Hiroki Ueda
    Sieving Using Bucket Sort. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:92-102 [Conf]
  9. Eonkyung Lee
    Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:103-118 [Conf]
  10. Berry Schoenmakers, Pim Tuyls
    Practical Two-Party Computation Based on the Conditional Gate. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:119-136 [Conf]
  11. Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey
    Privacy in Non-private Environments. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:137-151 [Conf]
  12. Bartosz Przydatek, Reto Strobl
    Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:152-169 [Conf]
  13. Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
    Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:170-186 [Conf]
  14. Palash Sarkar
    Masking Based Domain Extenders for UOWHFs: Bounds and Constructions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:187-200 [Conf]
  15. Deukjo Hong, Bart Preneel, Sangjin Lee
    Higher Order Universal One-Way Hash Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:201-213 [Conf]
  16. Frédéric Muller
    The MD2 Hash Function Is Not One-Way. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:214-229 [Conf]
  17. Muxiang Zhang
    New Approaches to Password Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:230-244 [Conf]
  18. Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
    Constant-Round Authenticated Group Key Exchange for Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:245-259 [Conf]
  19. Tatsuyuki Matsushita, Hideki Imai
    A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:260-275 [Conf]
  20. Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis
    Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:276-292 [Conf]
  21. Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
    Secret Handshakes from CA-Oblivious Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:293-307 [Conf]
  22. Isamu Teranishi, Jun Furukawa, Kazue Sako
    k-Times Anonymous Authentication (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:308-322 [Conf]
  23. Claus Diem
    The XL-Algorithm and a Conjecture from Commutative Algebra. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:323-337 [Conf]
  24. Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita
    Comparison Between XL and Gröbner Basis Algorithms. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:338-353 [Conf]
  25. Jean Monnerat, Serge Vaudenay
    Generic Homomorphic Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:354-371 [Conf]
  26. Lan Nguyen, Reihaneh Safavi-Naini
    Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:372-386 [Conf]
  27. In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek
    On the Security of MOR Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:387-400 [Conf]
  28. Aggelos Kiayias, Moti Yung
    Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:401-416 [Conf]
  29. Feng Bao
    Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:417-429 [Conf]
  30. Ho-Ick Suk
    Information Security in Korea IT839 Strategy. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:430-431 [Conf]
  31. Thomas Baignères, Pascal Junod, Serge Vaudenay
    How Far Can We Go Beyond Linear Cryptanalysis? [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:432-450 [Conf]
  32. Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette
    The Davies-Murphy Power Attack. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:451-467 [Conf]
  33. Joydip Mitra, Palash Sarkar
    Time-Memory Trade-Off Attacks on Multiplications and T-Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:468-482 [Conf]
  34. Yi Lu 0002, Serge Vaudenay
    Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:483-499 [Conf]
  35. Ahto Buldas, Märt Saarepera
    On Provably Secure Time-Stamping Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:500-514 [Conf]
  36. Ian F. Blake, Vladimir Kolesnikov
    Strong Conditional Oblivious Transfer and Computing on Intervals. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:515-529 [Conf]
  37. Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti
    Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:530-544 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002