×
Loading...

Advances in cryptology : EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings by EUROCRYPT (2004 : Interlaken, Switzerlan...

Book Information

TitleAdvances in cryptology : EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings
CreatorEUROCRYPT (2004 : Interlaken, Switzerland), Cachin, Christian, Camenisch, Jan
Year2004
PPI300
PublisherBerlin ; New York : Springer
LanguageEnglish
Mediatypetexts
SubjectComputers, Cryptography, Data transmission systems, Ordinateurs, Cryptographie, Données, Contrôle d'accès, Ordinateur, Cryptographie (Informatique), Transmission des données, Mesures de sécurité, Kryptologie, Transmission des données, Mesures de sécurité, Kryptologie
ISBN3540219358, 9783540219354
Collectionjournals_contributions, journals
Uploadersketch
Identifierspringer_10.1007-b97182
Telegram icon Share on Telegram
Download Now

Description

Advances in Cryptology - EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. ProceedingsAuthor: Christian Cachin, Jan L. Camenisch Published by Springer Berlin Heidelberg ISBN: 978-3-540-21935-4 DOI: 10.1007/b97182Table of Contents:Efficient Private Matching and Set Intersection Positive Results and Techniques for Obfuscation Secure Computation of the k Short Signatures Without Random Oracles Sequential Aggregate Signatures from Trapdoor Permutations On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission The Exact Price for Unconditionally Secure Asymmetric Cryptography On Generating the Initial Key in the Bounded-Storage Model Practical Large-Scale Distributed Key Generation Optimal Communication Complexity of Generic Multicast Key Distribution An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem Black-Box Composition Does Not Imply Adaptive Security Chosen-Ciphertext Security from Identity-Based Encryption Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles Construction of Secure Random Curves of Genus 2 over Prime Fields Projective Coordinates Leak Security Proofs for Identity-Based Identification and Signature Schemes Concurrent Signatures The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures Public-Key Steganography, Includes bibliographical references and index