


default search action
4. SCN 2004: Amalfi, Italy
- Carlo Blundo, Stelvio Cimato:

Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3352, Springer 2005, ISBN 3-540-24301-1
Invited Talk
- Bart Preneel:

ECRYPT: The Cryptographic Research Challenges for the Next Decade. 1-15
Reduction of Security/Primitives
- Adam L. Young, Moti Yung:

Relationships Between Diffie-Hellman and "Index Oracles". 16-32 - Duong Hieu Phan

, David Pointcheval
:
On the Security Notions for Public-Key Encryption Schemes. 33-46 - Claude Crépeau, Kirill Morozov, Stefan Wolf

:
Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. 47-59
Signature Schemes
- Siamak Fayyaz Shahandashti

, Mahmoud Salmasizadeh, Javad Mohajeri:
A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs. 60-76 - Jun Furukawa, Shoko Yonezawa:

Group Signatures with Separate and Distributed Authorities. 77-90 - Giovanni Di Crescenzo, Gonzalo R. Arce, Renwei Ge:

Threshold Cryptography for Mobile Ad Hoc Networks. 91-104
Anonymity and Privacy
- Fabien Laguillaumie, Damien Vergnaud:

Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. 105-119 - Jan Camenisch, Jens Groth

:
Group Signatures: Better Efficiency and New Theoretical Aspects. 120-133 - Jan Camenisch, Maciej Koprowski, Bogdan Warinschi:

Efficient Blind Signatures Without Random Oracles. 134-148
Authentication and Identification
- Ari Juels:

Minimalist Cryptography for Low-Cost RFID Tags. 149-164 - Giuseppe Ateniese, Breno de Medeiros:

On the Key Exposure Problem in Chameleon Hashes. 165-179
Zero Knowledge
- Jonathan Katz, Rafail Ostrovsky, Michael O. Rabin:

Identity-Based Zero Knowledge. 180-192
Public Key Cryptosystems
- Claude Castelluccia, Stanislaw Jarecki, Jihye Kim

, Gene Tsudik:
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. 193-207 - Nigel P. Smart:

Efficient Key Encapsulation to Multiple Parties. 208-219 - Benoît Libert, Jean-Jacques Quisquater:

Improved Signcryption from q-Diffie-Hellman Problems. 220-234
Distributed Cryptography
- Stelvio Cimato, Roberto De Prisco

, Alfredo De Santis
:
Colored Visual Cryptography Without Color Darkening. 235-248 - Ventzislav Nikov, Svetla Nikova, Bart Preneel:

On the Size of Monotone Span Programs. 249-262 - Douglas Wikström:

Universally Composable DKG with Linear Number of Exponentiations. 263-277
Cryptanalysis of Public Key Cryptosystems
- Joseph H. Silverman, Nigel P. Smart, Frederik Vercauteren:

An Algebraic Approach to NTRU (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear Equations. 278-293 - Christopher Wolf, An Braeken, Bart Preneel:

Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. 294-309
Cryptanalysis
- Miodrag J. Mihaljevic, Hideki Imai:

The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. 310-323 - Hirotaka Yoshida, Alex Biryukov, Christophe De Cannière, Joseph Lano, Bart Preneel:

Non-randomness of the Full 4 and 5-Pass HAVAL. 324-336
Email Security
- Amir Herzberg

:
Controlling Spam by Secure Internet Content Selection. 337-350
Key Distribution and Feedback Shift Registers
- Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland:

On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. 351-366 - Van-Ly Le, Werner Schindler:

How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers. 367-380

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














