Borrow it
 Architecture Library
 Bizzell Memorial Library
 Boorstin Collection
 Chinese Literature Translation Archive
 Engineering Library
 Fine Arts Library
 Harry W. Bass Business History Collection
 History of Science Collections
 John and Mary Nichols Rare Books and Special Collections
 Library Service Center
 Price College Digital Library
 Western History Collections
The Resource Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings, edited by Christian Cachin, Jan Camenisch, (electronic resource)
Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings, edited by Christian Cachin, Jan Camenisch, (electronic resource)
Resource Information
The item Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings, edited by Christian Cachin, Jan Camenisch, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Oklahoma Libraries.This item is available to borrow from all library branches.
Resource Information
The item Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings, edited by Christian Cachin, Jan Camenisch, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Oklahoma Libraries.
This item is available to borrow from all library branches.
 Summary
 These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C ference. The conference was organized by members of the IBM Zurich Research Laboratory in cooperation with IACR, the International Association for Cr tologic Research. Theconferencereceivedarecordnumberof206submissions,outofwhichthe program committee selected 36 for presentation at the conference (three papers were withdrawn by the authors shortly after submission). These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also featured two invited talks. The ?rst one was the 2004 IACR Distinguished Lecture given by Whit?eld Di?e. The second invited talk was by Ivan Damg? ard who presented “Paradigms for Multiparty Computation. ” The traditional rump session with short informal talks on recent results was chaired by Arjen Lenstra. The reviewing process was a challenging task, and many good submissions had to be rejected. Each paper was reviewed independently by at least three members of the program committee, and papers coauthored by a member of the program committee were reviewed by at least six (other) members. The individual reviewing phase was followed by profound and sometimes lively d cussions about the papers, which contributed a lot to the quality of the ?nal selection. Extensive comments were sent to the authors in most cases
 Language

 eng
 eng
 Edition
 1st ed. 2004.
 Extent
 1 online resource (XII, 630 p.)
 Note
 Bibliographic Level Mode of Issuance: Monograph
 Contents

 Private Computation
 Efficient Private Matching and Set Intersection
 Positive Results and Techniques for Obfuscation
 Secure Computation of the k th Ranked Element
 Signatures I
 Short Signatures Without Random Oracles
 Sequential Aggregate Signatures from Trapdoor Permutations
 Unconditional Security
 On the KeyUncertainty of Quantum Ciphers and the Computational Security of OneWay Quantum Transmission
 The Exact Price for Unconditionally Secure Asymmetric Cryptography
 On Generating the Initial Key in the BoundedStorage Model
 Distributed Cryptography
 Practical LargeScale Distributed Key Generation
 Optimal Communication Complexity of Generic Multicast Key Distribution
 Foundations I
 An Uninstantiable RandomOracleModel Scheme for a HybridEncryption Problem
 BlackBox Composition Does Not Imply Adaptive Security
 IdentityBased Encryption
 ChosenCiphertext Security from IdentityBased Encryption
 Efficient SelectiveID Secure IdentityBased Encryption Without Random Oracles
 Elliptic Curves
 Construction of Secure Random Curves of Genus 2 over Prime Fields
 Projective Coordinates Leak
 Signatures II
 Security Proofs for IdentityBased Identification and Signature Schemes
 Concurrent Signatures
 The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
 PublicKey Cryptography
 PublicKey Steganography
 Immunizing Encryption Schemes from Decryption Errors
 Secure Hashed DiffieHellman over NonDDH Groups
 Foundations II
 On SimulationSound Trapdoor Commitments
 Hash Function Balance and Its Impact on Birthday Attacks
 Multiparty Computation
 Multiparty Computation with Hybrid Security
 On the Hardness of InformationTheoretic Multiparty Computation
 Dining Cryptographers Revisited
 Cryptanalysis
 Algebraic Attacks and Decomposition of Boolean Functions
 Finding Small Roots of Bivariate Integer Polynomial Equations Revisited
 New Applications
 Public Key Encryption with Keyword Search
 Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
 Algorithms and Implementation
 Merkle Tree Traversal in Log Space and Time
 Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3
 Anonymity
 Traceable Signatures
 Handcuffing Big Brother: an AbuseResilient Transaction Escrow Scheme
 Anonymous Identification in Ad Hoc Groups
 Isbn
 9786610307371
 Label
 Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings
 Title
 Advances in Cryptology – EUROCRYPT 2004
 Title remainder
 International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings
 Statement of responsibility
 edited by Christian Cachin, Jan Camenisch
 Subject

 Information Systems
 Operating systems (Computers)
 Operating Systems
 Management of Computing and Information Systems
 Computer software
 Algorithm Analysis and Problem Complexity
 Cryptology
 Computer Communication Networks
 Data encryption (Computer science)
 Computer Communication Networks
 Computational complexity
 Discrete Mathematics in Computer Science
 Language

 eng
 eng
 Summary
 These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C ference. The conference was organized by members of the IBM Zurich Research Laboratory in cooperation with IACR, the International Association for Cr tologic Research. Theconferencereceivedarecordnumberof206submissions,outofwhichthe program committee selected 36 for presentation at the conference (three papers were withdrawn by the authors shortly after submission). These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also featured two invited talks. The ?rst one was the 2004 IACR Distinguished Lecture given by Whit?eld Di?e. The second invited talk was by Ivan Damg? ard who presented “Paradigms for Multiparty Computation. ” The traditional rump session with short informal talks on recent results was chaired by Arjen Lenstra. The reviewing process was a challenging task, and many good submissions had to be rejected. Each paper was reviewed independently by at least three members of the program committee, and papers coauthored by a member of the program committee were reviewed by at least six (other) members. The individual reviewing phase was followed by profound and sometimes lively d cussions about the papers, which contributed a lot to the quality of the ?nal selection. Extensive comments were sent to the authors in most cases
 Dewey number
 005.82
 http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt

 fIuujVfjzxk
 UVzpgsXlZzA
 Image bit depth
 0
 Language note
 English
 LC call number
 QA76.9.D335
 Literary form
 non fiction
 Nature of contents
 dictionaries
 http://library.link/vocab/relatedWorkOrContributorName

 EUROCRYPT
 Cachin, Christian.
 Camenisch, Jan.
 Series statement
 Lecture Notes in Computer Science,
 Series volume
 3027
 http://library.link/vocab/subjectName

 Data encryption (Computer science)
 Computer Communication Networks
 Operating systems (Computers)
 Computer software
 Computational complexity
 Information Systems
 Cryptology
 Computer Communication Networks
 Operating Systems
 Algorithm Analysis and Problem Complexity
 Discrete Mathematics in Computer Science
 Management of Computing and Information Systems
 Label
 Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings, edited by Christian Cachin, Jan Camenisch, (electronic resource)
 Note
 Bibliographic Level Mode of Issuance: Monograph
 Antecedent source
 mixed
 Bibliography note
 Includes bibliographical references at the end of each chapters and index
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 Private Computation  Efficient Private Matching and Set Intersection  Positive Results and Techniques for Obfuscation  Secure Computation of the k th Ranked Element  Signatures I  Short Signatures Without Random Oracles  Sequential Aggregate Signatures from Trapdoor Permutations  Unconditional Security  On the KeyUncertainty of Quantum Ciphers and the Computational Security of OneWay Quantum Transmission  The Exact Price for Unconditionally Secure Asymmetric Cryptography  On Generating the Initial Key in the BoundedStorage Model  Distributed Cryptography  Practical LargeScale Distributed Key Generation  Optimal Communication Complexity of Generic Multicast Key Distribution  Foundations I  An Uninstantiable RandomOracleModel Scheme for a HybridEncryption Problem  BlackBox Composition Does Not Imply Adaptive Security  IdentityBased Encryption  ChosenCiphertext Security from IdentityBased Encryption  Efficient SelectiveID Secure IdentityBased Encryption Without Random Oracles  Elliptic Curves  Construction of Secure Random Curves of Genus 2 over Prime Fields  Projective Coordinates Leak  Signatures II  Security Proofs for IdentityBased Identification and Signature Schemes  Concurrent Signatures  The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures  PublicKey Cryptography  PublicKey Steganography  Immunizing Encryption Schemes from Decryption Errors  Secure Hashed DiffieHellman over NonDDH Groups  Foundations II  On SimulationSound Trapdoor Commitments  Hash Function Balance and Its Impact on Birthday Attacks  Multiparty Computation  Multiparty Computation with Hybrid Security  On the Hardness of InformationTheoretic Multiparty Computation  Dining Cryptographers Revisited  Cryptanalysis  Algebraic Attacks and Decomposition of Boolean Functions  Finding Small Roots of Bivariate Integer Polynomial Equations Revisited  New Applications  Public Key Encryption with Keyword Search  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data  Algorithms and Implementation  Merkle Tree Traversal in Log Space and Time  Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3  Anonymity  Traceable Signatures  Handcuffing Big Brother: an AbuseResilient Transaction Escrow Scheme  Anonymous Identification in Ad Hoc Groups
 Dimensions
 unknown
 Edition
 1st ed. 2004.
 Extent
 1 online resource (XII, 630 p.)
 File format
 multiple file formats
 Form of item
 online
 Isbn
 9786610307371
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/b97182
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number

 (CKB)1000000000212368
 (DEHe213)9783540246763
 (SSID)ssj0000098382
 (PQKBManifestationID)11140408
 (PQKBTitleCode)TC0000098382
 (PQKBWorkID)10121878
 (PQKB)11304728
 (MiAaPQ)EBC3088562
 (EXLCZ)991000000000212368
 Label
 Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings, edited by Christian Cachin, Jan Camenisch, (electronic resource)
 Note
 Bibliographic Level Mode of Issuance: Monograph
 Antecedent source
 mixed
 Bibliography note
 Includes bibliographical references at the end of each chapters and index
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 Private Computation  Efficient Private Matching and Set Intersection  Positive Results and Techniques for Obfuscation  Secure Computation of the k th Ranked Element  Signatures I  Short Signatures Without Random Oracles  Sequential Aggregate Signatures from Trapdoor Permutations  Unconditional Security  On the KeyUncertainty of Quantum Ciphers and the Computational Security of OneWay Quantum Transmission  The Exact Price for Unconditionally Secure Asymmetric Cryptography  On Generating the Initial Key in the BoundedStorage Model  Distributed Cryptography  Practical LargeScale Distributed Key Generation  Optimal Communication Complexity of Generic Multicast Key Distribution  Foundations I  An Uninstantiable RandomOracleModel Scheme for a HybridEncryption Problem  BlackBox Composition Does Not Imply Adaptive Security  IdentityBased Encryption  ChosenCiphertext Security from IdentityBased Encryption  Efficient SelectiveID Secure IdentityBased Encryption Without Random Oracles  Elliptic Curves  Construction of Secure Random Curves of Genus 2 over Prime Fields  Projective Coordinates Leak  Signatures II  Security Proofs for IdentityBased Identification and Signature Schemes  Concurrent Signatures  The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures  PublicKey Cryptography  PublicKey Steganography  Immunizing Encryption Schemes from Decryption Errors  Secure Hashed DiffieHellman over NonDDH Groups  Foundations II  On SimulationSound Trapdoor Commitments  Hash Function Balance and Its Impact on Birthday Attacks  Multiparty Computation  Multiparty Computation with Hybrid Security  On the Hardness of InformationTheoretic Multiparty Computation  Dining Cryptographers Revisited  Cryptanalysis  Algebraic Attacks and Decomposition of Boolean Functions  Finding Small Roots of Bivariate Integer Polynomial Equations Revisited  New Applications  Public Key Encryption with Keyword Search  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data  Algorithms and Implementation  Merkle Tree Traversal in Log Space and Time  Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3  Anonymity  Traceable Signatures  Handcuffing Big Brother: an AbuseResilient Transaction Escrow Scheme  Anonymous Identification in Ad Hoc Groups
 Dimensions
 unknown
 Edition
 1st ed. 2004.
 Extent
 1 online resource (XII, 630 p.)
 File format
 multiple file formats
 Form of item
 online
 Isbn
 9786610307371
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/b97182
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number

 (CKB)1000000000212368
 (DEHe213)9783540246763
 (SSID)ssj0000098382
 (PQKBManifestationID)11140408
 (PQKBTitleCode)TC0000098382
 (PQKBWorkID)10121878
 (PQKB)11304728
 (MiAaPQ)EBC3088562
 (EXLCZ)991000000000212368
Subject
 Algorithm Analysis and Problem Complexity
 Computational complexity
 Computer Communication Networks
 Computer Communication Networks
 Computer software
 Cryptology
 Data encryption (Computer science)
 Discrete Mathematics in Computer Science
 Information Systems
 Management of Computing and Information Systems
 Operating Systems
 Operating systems (Computers)
Member of
Library Locations

Architecture LibraryBorrow itGould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US35.205706 97.445050



Chinese Literature Translation ArchiveBorrow it401 W. Brooks St., RM 414, Norman, OK, 73019, US35.207487 97.447906

Engineering LibraryBorrow itFelgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US35.205706 97.445050

Fine Arts LibraryBorrow itCatlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US35.210371 97.448244

Harry W. Bass Business History CollectionBorrow it401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US35.207487 97.447906

History of Science CollectionsBorrow it401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US35.207487 97.447906

John and Mary Nichols Rare Books and Special CollectionsBorrow it401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US35.207487 97.447906


Price College Digital LibraryBorrow itAdams Hall 102 307 West Brooks St., Norman, OK, 73019, US35.210371 97.448244

Western History CollectionsBorrow itMonnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US35.209584 97.445414
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%93EUROCRYPT2004/pj5gfvheFco/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%93EUROCRYPT2004/pj5gfvheFco/">Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings, edited by Christian Cachin, Jan Camenisch, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings, edited by Christian Cachin, Jan Camenisch, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%93EUROCRYPT2004/pj5gfvheFco/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%93EUROCRYPT2004/pj5gfvheFco/">Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings, edited by Christian Cachin, Jan Camenisch, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>