Indocrypt 2004
Accepted papers
- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations
Audrey Montreuil and Jacques Patarin
- On the Security of a Certified E-Mail Scheme
Guilin Wang, Feng Bao, Jianying Zhou
- Multiplicative Homomorphic E-Voting
Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
- Chosen Ciphertext Attack on a New Class of Self-Synchronizing
Stream Ciphers
Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
- Algebraic Attacks over GF(q)
Lynn Margaret Batten
- Results on Algebraic Immunity for Cryptographically Significant
Boolean Functions
Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
- Generalized Boolean Bent Functions
Laurent Poinsot and Sami Harari
- On Boolean Functions with Generalized Cryptographic
Properties
An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
- Information Theory and the Security of Binary Data
Perturbation
Poorvi L. Vora
- Symmetric Authentication Codes with Secrecy and Unconditionally
Secure Authenticated Encryption
Luke McAven, Reihaneh Safavi-Naini, Moti Yung
- Faster Variants of the MESH Block Ciphers
Jorge Nakahara Júnior
- Related-Key Attacks on Reduced Rounds of SHACAL-2
Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Junghwan Song
- Related-Key Attacks on DDP based Ciphers: CIKS-128 and
CIKS-128H
Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin
Lee
- Cryptanalysis of Ake98
Jorge Nakahara Júnior and Daniel Santana de Freitas
- Designing an Efficient and Secure Public-Key Cryptosystem based
on Reducible Rank Codes
Thierry Berger and Pierre Loidreau
- HEAD: Hybrid Encryption with Delegated Decryption
Capability
Palash Sarkar
- A Provably Secure Elliptic Curve Scheme with Fast
Encryption
David Galindo, Sebastiŕ Martěn, Tsuyoshi Takagi, Jorge L. Villar
- Advances in Alternative Non-Adjacent Form
Representations
Gildas Avoine, Jean Monnerat, Thomas Peyrin
- Attacks on Public Key Cryptosystems Based on Free Partially
Commutative Monoids and Groups
Françoise Levy-dit-Vehel and Ludovic Perret
- Exact Analysis of Montgomery Multiplication
Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi
- Cryptography, Connections, Cocycles and Crystals: a p-adic
Exploration of the Discrete Logarithm Problem
H. Gopalkrishna Gadiyar, K.M. Sangeeta Maini, R. Padma
- EME*: Extending EME to Handle Arbitrary-Length Messages with
Associated Data
Shai Halevi
- Impossibility of Construction of OWHF and UOWHF from PGV Model
based on Block Cipher Secure against ACPCA
Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee,
Soohak Sung
- The Security and Performance of the Galois/Counter Mode (GCM)
of Operation
David A. McGrew and John Viega
- Revisiting Fully Distributed Proxy Signature Schemes
Javier Herranz and Germán Sáez
- New ID-based Threshold Signature Scheme from Bilinear
Pairings
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim
- Separable Linkable Threshold Ring Signatures
Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph
K. Liu, Duncan S. Wong
- A New Black and White Visual Cryptographic Scheme for General
Access Structures
Avishek Adhikari, Tridib Kumar Dutta, Bimal Roy
- Identification Algorithms for Sequential Traitor
Tracing
Marcel Fernandez and Miguel Soriano
Last modification on October 12, 2004.