IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of ASIACRYPT 2002

Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings , Springer
Analysis of Bernstein's Factorization Circuit., Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer, pp. 1-26
 PDF  postscript BibTeX
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order., Stefan Lucks, pp. 27-45
 PDF  postscript BibTeX
Looking beyond XTR., Wieb Bosma, James Hutton, Eric R. Verheul, pp. 46-63
 PDF  postscript BibTeX
Bounds for Robust Metering Schemes and Their Relationship with A-code., Wakaha Ogata, Kaoru Kurosawa, pp. 64-80
 PDF  postscript BibTeX
Unconditionally Secure Anonymous Encryption and Group Authentication., Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai, pp. 81-99
 PDF  postscript BibTeX
Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model., Alexander W. Dent, pp. 100-109
 PDF  postscript BibTeX
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives., Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu, pp. 110-124
 PDF  postscript BibTeX
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order., Ivan Damgård, Eiichiro Fujisaki, pp. 125-142
 PDF  postscript BibTeX
Efficient Oblivious Transfer in the Bounded-Storage Model., Dowon Hong, Ku-Young Chang, Heuisu Ryu, pp. 143-159
 PDF  postscript BibTeX
In How Many Ways Can You Write Rijndael?, Elad Barkan, Eli Biham, pp. 160-175
 PDF  postscript BibTeX
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis., Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim, pp. 176-191
 PDF  postscript BibTeX
Threshold Cryptosystems Based on Factoring., Jonathan Katz, Moti Yung, pp. 192-205
 PDF  postscript BibTeX
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments., Masayuki Abe, Ronald Cramer, Serge Fehr, pp. 206-223
 PDF  postscript BibTeX
Asynchronous Secure Communication Tolerating Mixed Adversaries., K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan, pp. 224-242
 PDF  postscript BibTeX
Amplified Boomerang Attack against Reduced-Round SHACAL., Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung, pp. 243-253
 PDF  postscript BibTeX
Enhancing Differential-Linear Cryptanalysis., Eli Biham, Orr Dunkelman, Nathan Keller, pp. 254-266
 PDF  postscript BibTeX
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations., Nicolas Courtois, Josef Pieprzyk, pp. 267-287
 PDF  postscript BibTeX
Analysis of Neural Cryptography., Alexander Klimov, Anton Mityagin, Adi Shamir, pp. 288-298
 PDF  postscript BibTeX
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm., Dario Catalano, Phong Q. Nguyen, Jacques Stern, pp. 299-310
 PDF  postscript BibTeX
A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2., Pierrick Gaudry, pp. 311-327
 PDF  postscript BibTeX
A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme., Hiroki Koga, pp. 328-345
 PDF  postscript BibTeX
On Unconditionally Secure Robust Distributed Key Distribution Centers., Paolo D'Arco, Douglas R. Stinson, pp. 346-363
 PDF  postscript BibTeX
Short Signatures in the Random Oracle Model., Louis Granboulan, pp. 364-378
 PDF  postscript BibTeX
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes., Alejandro Hevia, Daniele Micciancio, pp. 379-396
 PDF  postscript BibTeX
Transitive Signatures Based on Factoring and RSA., Mihir Bellare, Gregory Neven, pp. 397-414
 PDF  postscript BibTeX
1-out-of-n Signatures from a Variety of Keys., Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki, pp. 415-432
 PDF  postscript BibTeX
A Revocation Scheme with Minimal Storage at Receivers., Tomoyuki Asano, pp. 433-450
 PDF  postscript BibTeX
Optimistic Mixing for Exit-Polls., Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels, pp. 451-465
 PDF  postscript BibTeX
Improved Construction of Nonlinear Resilient S-Boxes., Kishan Chand Gupta, Palash Sarkar, pp. 466-483
 PDF  postscript BibTeX
An Upper Bound on the Number of m-Resilient Boolean Functions., Claude Carlet, Aline Gouget, pp. 484-496
 PDF  postscript BibTeX
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks., Emmanuel Bresson, Olivier Chevassut, David Pointcheval, pp. 497-514
 PDF  postscript BibTeX
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization., Chanathip Namprempre, pp. 515-532
 PDF  postscript BibTeX
ID-Based Blind Signature and Ring Signature from Pairings., Fangguo Zhang, Kwangjo Kim, pp. 533-547
 PDF  postscript BibTeX
Hierarchical ID-Based Cryptography., Craig Gentry, Alice Silverberg, pp. 548-566
 PDF  postscript BibTeX
Crypto-integrity., Moti Yung, pp. 567-573
 PDF  postscript BibTeX
Gummy and Conductive Silicone Rubber Fingers., Tsutomu Matsumoto, pp. 574-576
 PDF  postscript BibTeX

[ IACR home page ] © IACR