This website does readability filtering of other pages. All styles, scripts, forms and ads are stripped. If you want your website excluded or have other feedback, use this form.

Advances in Cryptology - CRYPTO 2004 - 24th Annual | Matt Franklin | Springer

This website uses cookies. By using our website and agreeing to our cookies policy, you consent to our use of cookies in accordance with the terms of this policy. Read more

Loading.. Your cart is empty.
    ...you'll find more products in the shopping cart. Total€239.99 View cart

    Get 50% off Philosophy, Ethics & Religion print books!

    Computer Science Security and Cryptology Lecture Notes in Computer Science Free Preview © 2004

    Advances in Cryptology - CRYPTO 2004

    24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings

    Editors: Franklin, Matt (Ed.)

    Buy this book

    eBook $109.00
    price for USA (gross) Buy eBook
    • ISBN 978-3-540-28628-8
    • Digitally watermarked, DRM-free
    • Included format: PDF
    • ebooks can be used on all reading devices
    • Immediate eBook download after purchase
    Softcover $149.00
    price for USA Buy Softcover
    • ISBN 978-3-540-22668-0
    • Free shipping for individuals worldwide
    • Usually dispatched within 3 to 5 business days.

    FAQ Policy
    About this book

    Crypto 2004, the 24th Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The program committee accepted 33 papers for presentation at the conf- ence. These were selected from a total of 211 submissions. Each paper received at least three independent reviews. The selection process included a Web-based discussion phase, and a one-day program committee meeting at New York U- versity. These proceedings include updated versions of the 33 accepted papers. The authors had a few weeks to revise them, aided by comments from the reviewers. However, the revisions were not subjected to any editorial review. Theconferenceprogramincludedtwoinvitedlectures.VictorShoup’sinvited talk was a survey on chosen ciphertext security in public-key encryption. Susan Landau’s invited talk was entitled “Security, Liberty, and Electronic Commu- cations”. Her extended abstract is included in these proceedings. We continued the tradition of a Rump Session, chaired by Stuart Haber. Those presentations (always short, often serious) are not included here.

    Show all

    Table of contents (34 chapters)

    • On Multiple Linear Approximations

      Biryukov, Alex (et al.)

      Pages 1-22

      Preview Buy Chapter $29.95
    • Feistel Schemes and Bi-linear Cryptanalysis

      Courtois, Nicolas T.

      Pages 23-40

      Preview Buy Chapter $29.95
    • Short Group Signatures

      Boneh, Dan (et al.)

      Pages 41-55

      Preview Buy Chapter $29.95
    • Signature Schemes and Anonymous Credentials from Bilinear Maps

      Camenisch, Jan (et al.)

      Pages 56-72

      Preview Buy Chapter $29.95
    • Complete Classification of Bilinear Hard-Core Functions

      Holenstein, Thomas (et al.)

      Pages 73-91

      Preview Buy Chapter $29.95
    • Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?

      Hsiao, Chun-Yuan (et al.)

      Pages 92-105

      Preview Buy Chapter $29.95
    • Security of Random Feistel Schemes with 5 or More Rounds

      Patarin, Jacques

      Pages 106-122

      Preview Buy Chapter $29.95
    • Signed Binary Representations Revisited

      Okeya, Katsuyuki (et al.)

      Pages 123-139

      Preview Buy Chapter $29.95
    • Compressed Pairings

      Scott, Michael (et al.)

      Pages 140-156

      Preview Buy Chapter $29.95
    • Asymptotically Optimal Communication for Torus-Based Cryptography

      Dijk, Marten (et al.)

      Pages 157-178

      Preview Buy Chapter $29.95
    • How to Compress Rabin Ciphertexts and Signatures (and More)

      Gentry, Craig

      Pages 179-200

      Preview Buy Chapter $29.95
    • On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields

      Cheng, Qi

      Pages 201-212

      Preview Buy Chapter $29.95
    • Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring

      May, Alexander

      Pages 213-219

      Preview Buy Chapter $29.95
    • Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks

      Gennaro, Rosario

      Pages 220-236

      Preview Buy Chapter $29.95
    • Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model

      Crescenzo, Giovanni (et al.)

      Pages 237-253

      Preview Buy Chapter $29.95
    • Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks

      Damgård, Ivan (et al.)

      Pages 254-272

      Preview Buy Chapter $29.95
    • The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols

      Bellare, Mihir (et al.)

      Pages 273-289

      Preview Buy Chapter $29.95
    • Near-Collisions of SHA-0

      Biham, Eli (et al.)

      Pages 290-305

      Preview Buy Chapter $29.95
    • Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions

      Joux, Antoine

      Pages 306-316

      Preview Buy Chapter $29.95
    • Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography

      Abe, Masayuki (et al.)

      Pages 317-334

      Preview Buy Chapter $29.95
    • Round-Optimal Secure Two-Party Computation

      Katz, Jonathan (et al.)

      Pages 335-354

      Preview Buy Chapter $29.95
    • Security, Liberty, and Electronic Communications

      Landau, Susan

      Pages 355-372

      Preview Buy Chapter $29.95
    • An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators

      Molland, Håvard (et al.)

      Pages 373-389

      Preview Buy Chapter $29.95
    • Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers

      Hawkes, Philip (et al.)

      Pages 390-406

      Preview Buy Chapter $29.95
    • Faster Correlation Attack on Bluetooth Keystream Generator E0

      Lu, Yi (et al.)

      Pages 407-425

      Preview Buy Chapter $29.95
    • A New Paradigm of Hybrid Encryption Scheme

      Kurosawa, Kaoru (et al.)

      Pages 426-442

      Preview Buy Chapter $29.95
    • Secure Identity Based Encryption Without Random Oracles

      Boneh, Dan (et al.)

      Pages 443-459

      Preview Buy Chapter $29.95
    • Non-interactive Timestamping in the Bounded Storage Model

      Moran, Tal (et al.)

      Pages 460-476

      Preview Buy Chapter $29.95
    • IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange

      Catalano, Dario (et al.)

      Pages 477-493

      Preview Buy Chapter $29.95
    • Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes

      Dodis, Yevgeniy (et al.)

      Pages 494-510

      Preview Buy Chapter $29.95
    • Efficient Tree-Based Revocation in Groups of Low-State Devices

      Goodrich, Michael T. (et al.)

      Pages 511-527

      Preview Buy Chapter $29.95
    • Privacy-Preserving Datamining on Vertically Partitioned Databases

      Dwork, Cynthia (et al.)

      Pages 528-544

      Preview Buy Chapter $29.95
    • Optimal Perfectly Secure Message Transmission

      Srinathan, K. (et al.)

      Pages 545-561

      Preview Buy Chapter $29.95
    • Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness

      Fitzi, Matthias (et al.)

      Pages 562-578

      Preview Buy Chapter $29.95
    Show next xx
    Read this book on SpringerLink

    Buy this book

    eBook $109.00
    price for USA (gross) Buy eBook
    • ISBN 978-3-540-28628-8
    • Digitally watermarked, DRM-free
    • Included format: PDF
    • ebooks can be used on all reading devices
    • Immediate eBook download after purchase
    Softcover $149.00
    price for USA Buy Softcover
    • ISBN 978-3-540-22668-0
    • Free shipping for individuals worldwide
    • Usually dispatched within 3 to 5 business days.

    FAQ Policy

    Services for this Book

    Download Product Flyer Download High-Resolution Cover Facebook Twitter LinkedIn Google++

    Recommended for you

    Bibliographic Information

    Bibliographic Information
    Book Title
    Advances in Cryptology - CRYPTO 2004
    Book Subtitle
    24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings
    Editors
    • Matt Franklin
    Series Title
    Lecture Notes in Computer Science
    Series Volume
    3152
    Copyright
    2004
    Publisher
    Springer-Verlag Berlin Heidelberg
    Copyright Holder
    Springer-Verlag Berlin Heidelberg
    eBook ISBN
    978-3-540-28628-8
    DOI
    10.1007/b99099
    Softcover ISBN
    978-3-540-22668-0
    Series ISSN
    0302-9743
    Edition Number
    1
    Number of Pages
    XI, 579
    Topics
    CLOSE PAGE 1 PAGE 2