default search action
4. SCN 2004: Amalfi, Italy
- Carlo Blundo, Stelvio Cimato:
Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3352, Springer 2005, ISBN 3-540-24301-1
Invited Talk
- Bart Preneel:
ECRYPT: The Cryptographic Research Challenges for the Next Decade. 1-15
Reduction of Security/Primitives
- Adam L. Young, Moti Yung:
Relationships Between Diffie-Hellman and "Index Oracles". 16-32 - Duong Hieu Phan, David Pointcheval:
On the Security Notions for Public-Key Encryption Schemes. 33-46 - Claude Crépeau, Kirill Morozov, Stefan Wolf:
Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. 47-59
Signature Schemes
- Siamak Fayyaz Shahandashti, Mahmoud Salmasizadeh, Javad Mohajeri:
A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs. 60-76 - Jun Furukawa, Shoko Yonezawa:
Group Signatures with Separate and Distributed Authorities. 77-90 - Giovanni Di Crescenzo, Gonzalo R. Arce, Renwei Ge:
Threshold Cryptography for Mobile Ad Hoc Networks. 91-104
Anonymity and Privacy
- Fabien Laguillaumie, Damien Vergnaud:
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. 105-119 - Jan Camenisch, Jens Groth:
Group Signatures: Better Efficiency and New Theoretical Aspects. 120-133 - Jan Camenisch, Maciej Koprowski, Bogdan Warinschi:
Efficient Blind Signatures Without Random Oracles. 134-148
Authentication and Identification
- Ari Juels:
Minimalist Cryptography for Low-Cost RFID Tags. 149-164 - Giuseppe Ateniese, Breno de Medeiros:
On the Key Exposure Problem in Chameleon Hashes. 165-179
Zero Knowledge
- Jonathan Katz, Rafail Ostrovsky, Michael O. Rabin:
Identity-Based Zero Knowledge. 180-192
Public Key Cryptosystems
- Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. 193-207 - Nigel P. Smart:
Efficient Key Encapsulation to Multiple Parties. 208-219 - Benoît Libert, Jean-Jacques Quisquater:
Improved Signcryption from q-Diffie-Hellman Problems. 220-234
Distributed Cryptography
- Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Colored Visual Cryptography Without Color Darkening. 235-248 - Ventzislav Nikov, Svetla Nikova, Bart Preneel:
On the Size of Monotone Span Programs. 249-262 - Douglas Wikström:
Universally Composable DKG with Linear Number of Exponentiations. 263-277
Cryptanalysis of Public Key Cryptosystems
- Joseph H. Silverman, Nigel P. Smart, Frederik Vercauteren:
An Algebraic Approach to NTRU (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear Equations. 278-293 - Christopher Wolf, An Braeken, Bart Preneel:
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. 294-309
Cryptanalysis
- Miodrag J. Mihaljevic, Hideki Imai:
The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. 310-323 - Hirotaka Yoshida, Alex Biryukov, Christophe De Cannière, Joseph Lano, Bart Preneel:
Non-randomness of the Full 4 and 5-Pass HAVAL. 324-336
Email Security
- Amir Herzberg:
Controlling Spam by Secure Internet Content Selection. 337-350
Key Distribution and Feedback Shift Registers
- Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland:
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. 351-366 - Van-Ly Le, Werner Schindler:
How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers. 367-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.