Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers (English)
- New search for: Hawkes, P.
- New search for: Rose, G. G.
- New search for: Hawkes, P.
- New search for: Rose, G. G.
- New search for: Franklin, Matthew
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers
-
Contributors:
-
Conference:24th, Annual international cryptology conference; Advances in cryptology: CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings / ; 2004 ; Santa Barbara, CA
-
Published in:LECTURE NOTES IN COMPUTER SCIENCE ; 390-406
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin , London
-
Publication date:2004-01-01
-
Size:17 pages
-
Remarks:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
On Multiple Linear ApproximationsBiryukov, A. / De Canniere, C. / Quisquater, M. et al. | 2004
- 23
-
Feistel Schemes and Bi-linear CryptanalysisCourtois, N. T. et al. | 2004
- 41
-
Short Group SignaturesBoneh, D. / Boyen, X. / Shacham, H. et al. | 2004
- 56
-
Signature Schemes and Anonymous Credentials from Bilinear MapsCamenisch, J. / Lysyanskaya, A. et al. | 2004
- 73
-
Complete Classification of Bilinear Hard-Core FunctionsHolenstein, T. / Maurer, U. / Sjodin, J. et al. | 2004
- 92
-
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?Hsiao, C.-Y. / Reyzin, L. et al. | 2004
- 106
-
Security of Random Feistel Schemes with 5 or More RoundsPatarin, J. et al. | 2004
- 123
-
Signed Binary Representations RevisitedOkeya, K. / Schmidt-Samoa, K. / Spahn, C. / Takagi, T. et al. | 2004
- 140
-
Compressed PairingsScott, M. / Barreto, P. S. L. M. et al. | 2004
- 157
-
Asymptotically Optimal Communication for Torus-Based Cryptographyvan Dijk, M. / Woodruff, D. et al. | 2004
- 179
-
How to Compress Rabin Ciphertexts and Signatures (and More)Gentry, C. et al. | 2004
- 201
-
On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite FieldsCheng, Q. et al. | 2004
- 213
-
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to FactoringMay, A. et al. | 2004
- 220
-
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle AttacksGennaro, R. et al. | 2004
- 237
-
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key ModelDi Crescenzo, G. / Persiano, G. / Visconti, I. et al. | 2004
- 254
-
Zero-Knowledge Proofs and String Commitments Withstanding Quantum AttacksDamgard, I. / Fehr, S. / Salvail, L. et al. | 2004
- 273
-
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge ProtocolsBellare, M. / Palacio, A. et al. | 2004
- 290
-
Near-Collisions of SHA-0Biham, E. / Chen, R. et al. | 2004
- 306
-
Multicollisions in Iterated Hash Functions. Application to Cascaded ConstructionsJoux, A. et al. | 2004
- 317
-
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold CryptographyAbe, M. / Fehr, S. et al. | 2004
- 335
-
Round-Optimal Secure Two-Party ComputationKatz, J. / Ostrovsky, R. et al. | 2004
- 355
-
Security, Liberty, and Electronic CommunicationsLandau, S. et al. | 2004
- 373
-
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream GeneratorsMolland, H. / Helleseth, T. et al. | 2004
- 390
-
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream CiphersHawkes, P. / Rose, G. G. et al. | 2004
- 407
-
Faster Correlation Attack on Bluetooth Keystream Generator E0Lu, Y. / Vaudenay, S. et al. | 2004
- 426
-
A New Paradigm of Hybrid Encryption SchemeKurosawa, K. / Desmedt, Y. et al. | 2004
- 443
-
Secure Identity Based Encryption Without Random OraclesBoneh, D. / Boyen, X. et al. | 2004
- 460
-
Non-interactive Timestamping in the Bounded Storage ModelMoran, T. / Shaltiel, R. / Ta-Shma, A. et al. | 2004
- 477
-
IPAKE: Isomorphisms for Password-Based Authenticated Key ExchangeCatalano, D. / Pointcheval, D. / Pornin, T. et al. | 2004
- 494
-
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC ModesDodis, Y. / Gennaro, R. / Hastad, J. / Krawczyk, H. / Rabin, T. et al. | 2004
- 511
-
Efficient Tree-Based Revocation in Groups of Low-State DevicesGoodrich, M. T. / Sun, J. Z. / Tamassia, R. et al. | 2004
- 528
-
Privacy-Preserving Datamining on Vertically Partitioned DatabasesDwork, C. / Nissim, K. et al. | 2004
- 545
-
Optimal Perfectly Secure Message TransmissionSrinathan, K. / Narayanan, A. / Rangan, C. P. et al. | 2004
- 562
-
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated RandomnessFitzi, M. / Wolf, S. / Wullschleger, J. et al. | 2004