skip to content
Advances in cryptology, CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings Preview this item
ClosePreview this item
Checking...

Advances in cryptology, CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings

Author: Matthew Franklin
Publisher: Berlin : Springer, 2004.
Series: Lecture notes in computer science, 3152.
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats
Summary:

Crypto 2004, the 24th Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
Conference papers and proceedings
Congresses
Congrès
Material Type: Conference publication, Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Matthew Franklin
ISBN: 3540226680 9783540226680
OCLC Number: 56333950
Description: xi, 578 pages : illustrations ; 24 cm.
Contents: On multiple linear approximations / Alex Biryukov, Christophe De Canniere, and Michael Quisquater --
Feistel schemes and bi-linear cryptanalysis / Nicolas T. Courtois --
Short group signatures / Dan Boneh, Xavier Boyen, and Hovav Shacham --
Signature schemes and anonymous credentials from bilinear maps / Jan Camenisch and Anna Lysyanskaya --
Complete classification of bilinear hard-core functions / Thomas Holenstein, Ueli Maurer, and Johan Sjodin --
Finding collisions on a public road, or do secure hash functions need secret coins? / Chun-Yuan Hsiao and Leonid Reyzin --
Security of random feistel schemes with 5 or more rounds / Jacques Patarin --
Signed binary representations revisited / Katsuyuki Okeya [and others] --
Compressed pairings / Michael Scott and Paulo S.L.M. Barreto --
Asymptotically optimal communication for torus-based cryptography / Marten van Dijk and David Woodruff --
How to compress rabin ciphertexts and signatures (and More) / Craig Gentry --
On the bounded sum-of-digits discrete logarithm problem in finite fields / Qi Cheng --
Computing the RSA secret key is deterministic polynomial time equivalent to factoring / Alexander May --
Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks / Rosario Gennaro --
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model / Giovanni Di Crescenzo, Giuseppe Persiano, and Ivan Visconti --
Zero-knowledge proofs and string commitments withstanding quantum attacks / Ivan Damgard, Serge Fehr, and Louis Salvail --
The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols / Mihir Bellare and Adriana Palacio --
Near-collisions of SHA-0 / Eli Biham and Rafi Chen --
Multicollisions in iterated hash functions : application to cascaded constructions / Antoine Joux --
Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography / Masayuki Abe and Serge Fehr --
Round-optimal secure two-party computation / Jonathan Katz and Rafail Ostrovsky --
Security, liberty, and electronic communications / Susan Landau --
An improved correlation attack against irregular clocked and filtered keystream generators / Havard Molland and Tor Helleseth --
Rewriting variables : the complexity of fast algebraic attacks on stream ciphers / Philip Hawkes and Gregory G. Rose --
Faster correlation attack on bluetooth keystream generator E0 / Yi Lu and Serge Vaudenay --
A new paradigm of hybrid encryption scheme / Kaoru Kurosawa and Yvo Desmedt --
Secure identity based encryption without random oracles / Dan Boneh and Xavier Boyen --
Non-interactive timestamping in the bounded storage model / Tal Moran, Ronen Shaltiel, and Amnon Ta-Shma --
IPAKE: isomorphisms for password-based authenticated key exchange / Dario Catalano, David Pointcheval, and Thomas Pornin --
Randomness extraction and key derivation using the CBC, cascade and HMAC modes / Yevgeniy Dodis [and others] --
Efficient tree-based revocation in groups of low-state devices / Michael T. Goodrich, Jonathan Z. Sun, and Roberto Tamassia --
Privacy-preserving datamining on vertically partitioned databases / Cynthia Dwork and Kobbi Nissim --
Optimal perfectly secure message transmission / K. Srinathan, Arvind Narayanan, and C. Pandu Rangan --
Pseudo-signatures, broadcast, and multi-party computation from correlated randomness / Matthias Fitzi, Stefan Wolf, and Jurg Wullschleger.
Series Title: Lecture notes in computer science, 3152.
Responsibility: Matt Franklin (ed.).

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/56333950> # Advances in cryptology, CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "56333950" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/370483068#Place/berlin> ; # Berlin
   schema:about <http://dewey.info/class/005.82/e22/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/donnees_transmission> ; # Données--Transmission
   schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/kryptologie> ; # Kryptologie
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/ordinateurs_acces_controle> ; # Ordinateurs--Accès--Contrôle
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/dataprocessing> ; # Dataprocessing
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/ordinateur> ; # Ordinateur
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/cryptographie_informatique> ; # Cryptographie (Informatique)
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/computers_access_control> ; # Computers--Access control
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/coderingstheorie> ; # Coderingstheorie
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Place/santa_barbara_calif_2004> ; # Santa Barbara
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Thing/cryptology> ; # Cryptology
   schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Thing/iacr> ; # IACR
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/geheimschrift> ; # Geheimschrift
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Thing/crypto> ; # CRYPTO
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/cryptographie> ; # Cryptographie
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/controle_d_acces> ; # Contrôle d'accès
   schema:about <http://experiment.worldcat.org/entity/work/data/370483068#Topic/cryptography> ; # Cryptography
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/64304104> ; # Matthew Franklin
   schema:creator <http://experiment.worldcat.org/entity/work/data/370483068#Meeting/crypto_conference_24th_2004_santa_barbara_calif> ; # CRYPTO (Conference) (24th : 2004 : Santa Barbara, Calif.)
   schema:datePublished "2004" ;
   schema:description "On multiple linear approximations / Alex Biryukov, Christophe De Canniere, and Michael Quisquater -- Feistel schemes and bi-linear cryptanalysis / Nicolas T. Courtois -- Short group signatures / Dan Boneh, Xavier Boyen, and Hovav Shacham -- Signature schemes and anonymous credentials from bilinear maps / Jan Camenisch and Anna Lysyanskaya -- Complete classification of bilinear hard-core functions / Thomas Holenstein, Ueli Maurer, and Johan Sjodin -- Finding collisions on a public road, or do secure hash functions need secret coins? / Chun-Yuan Hsiao and Leonid Reyzin -- Security of random feistel schemes with 5 or more rounds / Jacques Patarin -- Signed binary representations revisited / Katsuyuki Okeya [and others] -- Compressed pairings / Michael Scott and Paulo S.L.M. Barreto -- Asymptotically optimal communication for torus-based cryptography / Marten van Dijk and David Woodruff -- How to compress rabin ciphertexts and signatures (and More) / Craig Gentry -- On the bounded sum-of-digits discrete logarithm problem in finite fields / Qi Cheng -- Computing the RSA secret key is deterministic polynomial time equivalent to factoring / Alexander May -- Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks / Rosario Gennaro -- Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model / Giovanni Di Crescenzo, Giuseppe Persiano, and Ivan Visconti -- Zero-knowledge proofs and string commitments withstanding quantum attacks / Ivan Damgard, Serge Fehr, and Louis Salvail -- The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols / Mihir Bellare and Adriana Palacio -- Near-collisions of SHA-0 / Eli Biham and Rafi Chen -- Multicollisions in iterated hash functions : application to cascaded constructions / Antoine Joux -- Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography / Masayuki Abe and Serge Fehr -- Round-optimal secure two-party computation / Jonathan Katz and Rafail Ostrovsky -- Security, liberty, and electronic communications / Susan Landau -- An improved correlation attack against irregular clocked and filtered keystream generators / Havard Molland and Tor Helleseth -- Rewriting variables : the complexity of fast algebraic attacks on stream ciphers / Philip Hawkes and Gregory G. Rose -- Faster correlation attack on bluetooth keystream generator E0 / Yi Lu and Serge Vaudenay -- A new paradigm of hybrid encryption scheme / Kaoru Kurosawa and Yvo Desmedt -- Secure identity based encryption without random oracles / Dan Boneh and Xavier Boyen -- Non-interactive timestamping in the bounded storage model / Tal Moran, Ronen Shaltiel, and Amnon Ta-Shma -- IPAKE: isomorphisms for password-based authenticated key exchange / Dario Catalano, David Pointcheval, and Thomas Pornin -- Randomness extraction and key derivation using the CBC, cascade and HMAC modes / Yevgeniy Dodis [and others] -- Efficient tree-based revocation in groups of low-state devices / Michael T. Goodrich, Jonathan Z. Sun, and Roberto Tamassia -- Privacy-preserving datamining on vertically partitioned databases / Cynthia Dwork and Kobbi Nissim -- Optimal perfectly secure message transmission / K. Srinathan, Arvind Narayanan, and C. Pandu Rangan -- Pseudo-signatures, broadcast, and multi-party computation from correlated randomness / Matthias Fitzi, Stefan Wolf, and Jurg Wullschleger."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/370483068> ;
   schema:genre "Conference publication"@en ;
   schema:genre "Kongress"@en ;
   schema:genre "Conference papers and proceedings"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/370483068#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
   schema:name "Advances in cryptology, CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings"@en ;
   schema:productID "56333950" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/56333950#PublicationEvent/berlin_springer_2004> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/370483068#Agent/springer> ; # Springer
   schema:url <http://dx.doi.org/10.1007/b99099> ;
   schema:url <http://link.springer.com/10.1007/b99099> ;
   schema:url <http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3152> ;
   schema:workExample <http://worldcat.org/isbn/9783540226680> ;
   umbel:isLike <http://d-nb.info/971757224> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA472516> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/56333950> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/370483068#Meeting/crypto_conference_24th_2004_santa_barbara_calif> # CRYPTO (Conference) (24th : 2004 : Santa Barbara, Calif.)
    a bgn:Meeting, schema:Event ;
   schema:location <http://experiment.worldcat.org/entity/work/data/370483068#Place/santa_barbara_calif> ; # Santa Barbara, Calif.)
   schema:name "CRYPTO (Conference) (24th : 2004 : Santa Barbara, Calif.)" ;
    .

<http://experiment.worldcat.org/entity/work/data/370483068#Place/santa_barbara_calif> # Santa Barbara, Calif.)
    a schema:Place ;
   schema:name "Santa Barbara, Calif.)" ;
    .

<http://experiment.worldcat.org/entity/work/data/370483068#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/56333950> ; # Advances in cryptology, CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings
   schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/370483068#Topic/controle_d_acces> # Contrôle d'accès
    a schema:Intangible ;
   schema:name "Contrôle d'accès"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/370483068#Topic/cryptographie_informatique> # Cryptographie (Informatique)
    a schema:Intangible ;
   schema:name "Cryptographie (Informatique)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/370483068#Topic/donnees_transmission> # Données--Transmission
    a schema:Intangible ;
   schema:name "Données--Transmission"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/370483068#Topic/ordinateurs_acces_controle> # Ordinateurs--Accès--Contrôle
    a schema:Intangible ;
   schema:name "Ordinateurs--Accès--Contrôle"@fr ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
   schema:name "Computers--Access control"@en ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
   schema:name "Cryptography"@en ;
    .

<http://link.springer.com/10.1007/b99099>
   rdfs:comment "eBook available for UOIT via SpringerLink. Click link to access" ;
    .

<http://viaf.org/viaf/64304104> # Matthew Franklin
    a schema:Person ;
   schema:familyName "Franklin" ;
   schema:givenName "Matthew" ;
   schema:name "Matthew Franklin" ;
    .

<http://worldcat.org/isbn/9783540226680>
    a schema:ProductModel ;
   schema:isbn "3540226680" ;
   schema:isbn "9783540226680" ;
    .

<http://www.worldcat.org/title/-/oclc/56333950>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/56333950> ; # Advances in cryptology, CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings
   schema:dateModified "2018-03-11" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.