Ebook: Advances in Cryptology – CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings
- Genre: Computers // Cryptography
- Tags: Data Encryption, Computer Communication Networks, Operating Systems, Algorithm Analysis and Problem Complexity, Discrete Mathematics in Computer Science, Management of Computing and Information Systems
- Series: Lecture Notes in Computer Science 3152
- Year: 2004
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
Crypto 2004, the 24th Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The program committee accepted 33 papers for presentation at the conf- ence. These were selected from a total of 211 submissions. Each paper received at least three independent reviews. The selection process included a Web-based discussion phase, and a one-day program committee meeting at New York U- versity. These proceedings include updated versions of the 33 accepted papers. The authors had a few weeks to revise them, aided by comments from the reviewers. However, the revisions were not subjected to any editorial review. Theconferenceprogramincludedtwoinvitedlectures.VictorShoup’sinvited talk was a survey on chosen ciphertext security in public-key encryption. Susan Landau’s invited talk was entitled “Security, Liberty, and Electronic Commu- cations”. Her extended abstract is included in these proceedings. We continued the tradition of a Rump Session, chaired by Stuart Haber. Those presentations (always short, often serious) are not included here.
This book constitutes the refereed proceedings of the 24th AnnualInternational Cryptology Conference, CRYPTO 2004, held in SantaBarbara, California, USA in August 2004. The 33 revised full paperspresented together with one invited paper were carefully reviewed andselected from 211 submissions. The papers are organized in topicalsections in linear cryptanalysis, group signatures, foundations,efficient representations, public key cryptanalysis, zero-knowledge,hash collision, secure computation, stream cipher cryptanalysis,public key encryption, bounded storage model, key management, andcomputationally unbounded adversaries.