© 2004

Advances in Cryptology – CRYPTO 2004

24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings

  • Matt Franklin
Conference proceedings CRYPTO 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3152)

Table of contents

  1. Front Matter
  2. Linear Cryptanalysis

    1. Alex Biryukov, Christophe De Cannière, Michaël Quisquater
      Pages 1-22
    2. Nicolas T. Courtois
      Pages 23-40
  3. Group Signatures

    1. Dan Boneh, Xavier Boyen, Hovav Shacham
      Pages 41-55
    2. Jan Camenisch, Anna Lysyanskaya
      Pages 56-72
  4. Foundations

    1. Thomas Holenstein, Ueli Maurer, Johan Sjödin
      Pages 73-91
  5. Efficient Representations

    1. Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
      Pages 123-139
    2. Michael Scott, Paulo S. L. M. Barreto
      Pages 140-156
    3. Marten van Dijk, David Woodruff
      Pages 157-178
  6. Public Key Cryptanalysis

  7. Zero-Knowledge

  8. Hash Collisions

About these proceedings


Crypto 2004, the 24th Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The program committee accepted 33 papers for presentation at the conf- ence. These were selected from a total of 211 submissions. Each paper received at least three independent reviews. The selection process included a Web-based discussion phase, and a one-day program committee meeting at New York U- versity. These proceedings include updated versions of the 33 accepted papers. The authors had a few weeks to revise them, aided by comments from the reviewers. However, the revisions were not subjected to any editorial review. Theconferenceprogramincludedtwoinvitedlectures.VictorShoup’sinvited talk was a survey on chosen ciphertext security in public-key encryption. Susan Landau’s invited talk was entitled “Security, Liberty, and Electronic Commu- cations”. Her extended abstract is included in these proceedings. We continued the tradition of a Rump Session, chaired by Stuart Haber. Those presentations (always short, often serious) are not included here.


Bluetooth Oracle RSA Variable cryptanalysis cryptographic protocols cryptography cryptology cryptosystems data encryption database finite field privacy public key cryptography security

Editors and affiliations

  • Matt Franklin
    • 1
  1. 1.Department of Computer ScienceUniversity of CaliforniaDavisUSA

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking