Advances in Cryptology – CRYPTO 2004

24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings

  • Matt Franklin
Conference proceedings CRYPTO 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3152)

Table of contents

  1. Front Matter
  2. Linear Cryptanalysis

    1. Alex Biryukov, Christophe De Cannière, Michaël Quisquater
      Pages 1-22
    2. Nicolas T. Courtois
      Pages 23-40
  3. Group Signatures

    1. Dan Boneh, Xavier Boyen, Hovav Shacham
      Pages 41-55
    2. Jan Camenisch, Anna Lysyanskaya
      Pages 56-72
  4. Foundations

  5. Efficient Representations

    1. Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
      Pages 123-139
    2. Michael Scott, Paulo S. L. M. Barreto
      Pages 140-156
    3. Marten van Dijk, David Woodruff
      Pages 157-178
  6. Public Key Cryptanalysis

  7. Zero-Knowledge

  8. Hash Collisions

  9. Secure Computation

  10. Invited Talk

  11. Stream Cipher Cryptanalysis

  12. Public Key Encryption

    1. Kaoru Kurosawa, Yvo Desmedt
      Pages 426-442
    2. Dan Boneh, Xavier Boyen
      Pages 443-459
  13. Bounded Storage Model

    1. Tal Moran, Ronen Shaltiel, Amnon Ta-Shma
      Pages 460-476
  14. Key Management

    1. Dario Catalano, David Pointcheval, Thomas Pornin
      Pages 477-493
    2. Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin
      Pages 494-510
    3. Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia
      Pages 511-527
  15. Computationally Unbounded Adversaries

    1. Cynthia Dwork, Kobbi Nissim
      Pages 528-544
    2. K. Srinathan, Arvind Narayanan, C. Pandu Rangan
      Pages 545-561
    3. Matthias Fitzi, Stefan Wolf, Jürg Wullschleger
      Pages 562-578
  16. Back Matter

About these proceedings


Crypto 2004, the 24th Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The program committee accepted 33 papers for presentation at the conf- ence. These were selected from a total of 211 submissions. Each paper received at least three independent reviews. The selection process included a Web-based discussion phase, and a one-day program committee meeting at New York U- versity. These proceedings include updated versions of the 33 accepted papers. The authors had a few weeks to revise them, aided by comments from the reviewers. However, the revisions were not subjected to any editorial review. Theconferenceprogramincludedtwoinvitedlectures.VictorShoup’sinvited talk was a survey on chosen ciphertext security in public-key encryption. Susan Landau’s invited talk was entitled “Security, Liberty, and Electronic Commu- cations”. Her extended abstract is included in these proceedings. We continued the tradition of a Rump Session, chaired by Stuart Haber. Those presentations (always short, often serious) are not included here.


Bluetooth Oracle RSA Variable cryptanalysis cryptographic protocols cryptography cryptology cryptosystems data encryption database finite field privacy public key cryptography security

Editors and affiliations

  • Matt Franklin
    • 1
  1. 1.Department of Computer ScienceUniversity of CaliforniaDavisUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-22668-0
  • Online ISBN 978-3-540-28628-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software