The provided text is the preface and table of contents for the proceedings of the 24th Annual International Cryptology Conference (CRYPTO 2004) held in Santa Barbara, California, USA, from August 15-19, 2004. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California, Santa Barbara.
The proceedings include updated versions of 33 accepted papers, selected from 211 submissions, after a rigorous review process. The program included two invited lectures by Victor Shoup and Susan Landau, and a Rump Session chaired by Stuart Haber. The preface acknowledges the contributions of the global cryptographic community, the program committee, external reviewers, and the technical support team.
The conference covered a wide range of topics in cryptography, including linear cryptanalysis, group signatures, foundations, public key cryptanalysis, zero-knowledge proofs, hash collisions, secure computation, stream cipher cryptanalysis, public key encryption, bounded storage model, key management, and computationally unbounded adversaries. Each section of the proceedings includes detailed abstracts and references to the original papers.The provided text is the preface and table of contents for the proceedings of the 24th Annual International Cryptology Conference (CRYPTO 2004) held in Santa Barbara, California, USA, from August 15-19, 2004. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California, Santa Barbara.
The proceedings include updated versions of 33 accepted papers, selected from 211 submissions, after a rigorous review process. The program included two invited lectures by Victor Shoup and Susan Landau, and a Rump Session chaired by Stuart Haber. The preface acknowledges the contributions of the global cryptographic community, the program committee, external reviewers, and the technical support team.
The conference covered a wide range of topics in cryptography, including linear cryptanalysis, group signatures, foundations, public key cryptanalysis, zero-knowledge proofs, hash collisions, secure computation, stream cipher cryptanalysis, public key encryption, bounded storage model, key management, and computationally unbounded adversaries. Each section of the proceedings includes detailed abstracts and references to the original papers.