year |
venue |
title |
pages |
2002 | asiacrypt | Unconditionally Secure Anonymous Encryption and Group Authentication | online |
2002 | asiacrypt | A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme | online |
2002 | asiacrypt | Cryptanalysis of Block Ciphers with Overdefined Systems of Equations | online |
2002 | asiacrypt | Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings | online |
2002 | asiacrypt | On Unconditionally Secure Robust Distributed Key Distribution Centers | online |
2002 | asiacrypt | The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes | online |
2002 | asiacrypt | Efficient Oblivious Transfer in the Bounded-Storage Model | online |
2002 | asiacrypt | Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments | online |
2002 | asiacrypt | Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks | online |
2002 | asiacrypt | 1-out-of-n Signatures from a Variety of Keys | online |
2002 | asiacrypt | Crypto-integrity | online |
2002 | asiacrypt | ID-Based Blind Signature and Ring Signature from Pairings | online |
2002 | asiacrypt | A Revocation Scheme with Minimal Storage at Receivers | online |
2002 | asiacrypt | Analysis of Bernstein's Factorization Circuit | online |
2002 | asiacrypt | Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization | online |
2002 | asiacrypt | An Upper Bound on the Number of m-Resilient Boolean Functions | online |
2002 | asiacrypt | Bounds for Robust Metering Schemes and Their Relationship with A-code | online |
2002 | asiacrypt | Enhancing Differential-Linear Cryptanalysis | online |
2002 | asiacrypt | The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm | online |
2002 | asiacrypt | In How Many Ways Can You Write Rijndael? | online |
2002 | asiacrypt | A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order | online |
2002 | asiacrypt | On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives | online |
2002 | asiacrypt | On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis | online |
2002 | asiacrypt | Transitive Signatures Based on Factoring and RSA | online |
2002 | asiacrypt | Gummy and Conductive Silicone Rubber Fingers | online |
2002 | asiacrypt | Looking beyond XTR | online |
2002 | asiacrypt | A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order | online |
2002 | asiacrypt | Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model | online |
2002 | asiacrypt | A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2 | online |
2002 | asiacrypt | Hierarchical ID-Based Cryptography | online |
2002 | asiacrypt | Optimistic Mixing for Exit-Polls | online |
2002 | asiacrypt | Threshold Cryptosystems Based on Factoring | online |
2002 | asiacrypt | Asynchronous Secure Communication Tolerating Mixed Adversaries | online |
2002 | asiacrypt | Short Signatures in the Random Oracle Model | online |
2002 | asiacrypt | Amplified Boomerang Attack against Reduced-Round SHACAL | online |
2002 | asiacrypt | Improved Construction of Nonlinear Resilient S-Boxes | online |
2002 | asiacrypt | Analysis of Neural Cryptography | online |
2002 | ches | A Low-Power Design for an Elliptic Curve Digital Signature Chip | 366-380 |
2002 | ches | Optical Fault Induction Attacks | 2-12 |
2002 | ches | Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions | 318-332 |
2002 | ches | A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results | 593-609 |
2002 | ches | A Hardware Random Number Generator | 450-453 |
2002 | ches | Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks | 98-113 |
2002 | ches | Simplified Adaptive Multiplicative Masking for AES | 187-197 |
2002 | ches | Some Security Aspects of the M IST Randomized Exponentiation Algorithm | 276-290 |
2002 | ches | Dual-Field Arithmetic Unit for GF(p) and GF(2m) | 500-514 |
2002 | ches | Hardware Random Number Generation | |
2002 | ches | New Algorithm for Classical Modular Inverse | 57-70 |
2002 | ches | Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers | online |
2002 | ches | The EM Side-Channel(s) | 29-45 |
2002 | ches | Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor | 114-128 |
2002 | ches | Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures | 260-275 |
2002 | ches | Enhanced Montgomery Multiplication | 46-56 |
2002 | ches | An End-to-End Systems Approach to Elliptic Curve Cryptography | 349-365 |
2002 | ches | Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2) | 484-499 |
2002 | ches | Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks | 551-563 |
2002 | ches | Efficient Software Implementation of AES on 32-Bit Platforms | 159-171 |
2002 | ches | A DPA Attack against the Modular Reduction within a CRT Implementation of RSA | 228-243 |
2002 | ches | Genus Two Hyperelliptic Curve Coprocessor | 400-414 |
2002 | ches | Template Attacks | 13-28 |
2002 | ches | Keeping Secrets in Hardware: The Microsoft Xbox Case Study | 213-227 |
2002 | ches | Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA | 129-143 |
2002 | ches | Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication | 540-550 |
2002 | ches | DPA Countermeasures by Improving the Window Method | 303-317 |
2002 | ches | Experience Using a Low-Cost FPGA Design to Crack DES Keys | 579-592 |
2002 | ches | The Montgomery Powering Ladder | 291-302 |
2002 | ches | A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n) | 381-399 |
2002 | ches | Further Results and Considerations on Side Channel Attacks on RSA | 244-259 |
2002 | ches | True Random Number Generator Embedded in Reconfigurable Hardware | 415-430 |
2002 | ches | A New Class of Invertible Mappings | 470-483 |
2002 | ches | On the Efficient Generation of Elliptic Curves over Prime Fields | 333-348 |
2002 | ches | Increasing the Bitlength of a Crypto-Coprocessor | 71-81 |
2002 | ches | Multiplicative Masking and Power Analysis of AES | 198-212 |
2002 | ches | 2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis | 144-158 |
2002 | ches | An Optimized S-Box Circuit Architecture for Low Power AES Design | 172-186 |
2002 | ches | Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick | 564-578 |
2002 | ches | Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems | 82-97 |
2002 | ches | Hardware Implementation of Finite Fields of Characteristic Three | 529-539 |
2002 | ches | CHES: Past, Present, and Future | 1 |
2002 | ches | Error Detection in Polynomial Basis Multipliers over Binary Extension Fields | 515-528 |
2002 | ches | RFID Systems and Security and Privacy Implications | 454-469 |
2002 | ches | Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications | 431-449 |
2002 | crypto | (Not So) Random Shuffles of RC4 | online |
2002 | crypto | Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks | online |
2002 | crypto | Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials | online |
2002 | crypto | Cryptanalysis of Unbalanced RSA with Small CRT-Exponent | online |
2002 | crypto | New Directions in Quantum Cryptographic Protocols | |
2002 | crypto | Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2 | online |
2002 | crypto | A Generalized Birthday Problem | online |
2002 | crypto | Hidden Number Problem with the Trace and Bit Security of XTR and LUC | online |
2002 | crypto | Essential Algebraic Structure within the AES | online |
2002 | crypto | Deniable Ring Authentication | online |
2002 | crypto | Security Analysis of IKE's Signature-Based Key-Exchange Protocol | online |
2002 | crypto | Tweakable Block Ciphers | online |
2002 | crypto | A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction | online |
2002 | crypto | On 2-Round Secure Multiparty Computation | online |
2002 | crypto | Unique Signatures and Verifiable Random Functions from the DH-DDH Separation | online |
2002 | crypto | Analysis and Improvements of NTRU Encryption Paddings | online |
2002 | crypto | Threshold Password-Authenticated Key Exchange | online |
2002 | crypto | Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case | online |
2002 | crypto | A Threshold Pseudorandom Function Construction and Its Applications | online |
2002 | crypto | Threshold Ring Signatures and Applications to Ad-hoc Groups | online |
2002 | crypto | The LSD Broadcast Encryption Scheme | online |
2002 | crypto | Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV | online |
2002 | crypto | Provably Secure Steganography | online |
2002 | crypto | Private Computation - k-Connected versus 1-Connected Networks | online |
2002 | crypto | Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings | online |
2002 | crypto | Cryptanalysis of Stream Ciphers with Linear Masking | online |
2002 | crypto | SiBIR: Signer-Base Intrusion-Resilient Signatures | online |
2002 | crypto | Security Proof for Partial-Domain Hash Signature Schemes | online |
2002 | crypto | Universal Padding Schemes for RSA | online |
2002 | crypto | Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups | online |
2002 | crypto | Supersingular Abelian Varieties in Cryptology | online |
2002 | crypto | On the Security of RSA Encryption in TLS | online |
2002 | crypto | The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers | online |
2002 | crypto | Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products | online |
2002 | crypto | GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks | online |
2002 | crypto | Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC | online |
2002 | crypto | Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security | online |
2002 | crypto | Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor | online |
2002 | crypto | Efficient Algorithms for Pairing-Based Cryptosystems | online |
2002 | crypto | Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors | online |
2002 | crypto | Flaws in Applying Proof Methodologies to Signature Schemes | online |
2002 | eprint | Fractal Hash Sequence Representation and Traversal | online |
2002 | eprint | Evaluating Security of Voting Schemes in the Universal Composability Framework | online |
2002 | eprint | Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher | online |
2002 | eprint | ID-based Signatures from Pairings on Elliptic Curves | online |
2002 | eprint | Cryptanalysis of Stream Cipher COS (2,128) Mode I | online |
2002 | eprint | Parallel scalar multiplication on general elliptic curves over $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks | online |
2002 | eprint | Efficient Algorithms for Pairing-Based Cryptosystems | online |
2002 | eprint | Tree-based Group Key Agreement | online |
2002 | eprint | Cut and Paste Attacks with Java | online |
2002 | eprint | Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages | online |
2002 | eprint | Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings | online |
2002 | eprint | Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups | online |
2002 | eprint | Better than BiBa: Short One-time Signatures with Fast Signing and Verifying | online |
2002 | eprint | Security proofs of cryptographic protocols | online |
2002 | eprint | Content Extraction Signatures | online |
2002 | eprint | The Cramer-Shoup Strong-RSA Signature Scheme Revisited | online |
2002 | eprint | An Identity-Based Signature from Gap Diffie-Hellman Groups | online |
2002 | eprint | Scream: a software-efficient stream cipher | online |
2002 | eprint | Cryptanalysis of stream ciphers with linear masking | online |
2002 | eprint | Spectral Analysis of Boolean Functions under Non-uniformity of Arguments | online |
2002 | eprint | From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security | online |
2002 | eprint | Almost Optimal Hash Sequence Traversal | online |
2002 | eprint | Timed Release of Standard Digital Signatures | online |
2002 | eprint | Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking | online |
2002 | eprint | Generic Groups, Collision Resistance, and ECDSA | online |
2002 | eprint | Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications | online |
2002 | eprint | A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack | online |
2002 | eprint | Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products | online |
2002 | eprint | Adaptive chi-square test and its application to some cryptographic problems | online |
2002 | eprint | A Parallelizable Design Principle for Cryptographic Hash Functions | online |
2002 | eprint | Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields | online |
2002 | eprint | Equivalence between semantic security and indistinguishability against chosen ciphertext attacks | online |
2002 | eprint | An OAEP Variant With a Tight Security Proof | online |
2002 | eprint | Tripartite Authenticated Key Agreement Protocols from Pairings | online |
2002 | eprint | Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups | online |
2002 | eprint | An efficient semantically secure elliptic curve cryptosystem based on KMOV | online |
2002 | eprint | A Distributed RSA Signature Scheme for General Access Structures | online |
2002 | eprint | Partial Key Escrow Monitoring Scheme | online |
2002 | eprint | Secure Computation Without Agreement | online |
2002 | eprint | New Results on Boomerang and Rectangle Attack | online |
2002 | eprint | A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack | online |
2002 | eprint | Strict Polynomial-time in Simulation and Extraction | online |
2002 | eprint | Cryptanalysis of Block Ciphers with Overdefined Systems of Equations | online |
2002 | eprint | Cryptanalysis of S-DES | online |
2002 | eprint | On the Security of Joint Signature and Encryption | online |
2002 | eprint | Universal Composition with Joint State | online |
2002 | eprint | Towards a Uniform Description of Several Group Based Cryptographic Primitives | online |
2002 | eprint | Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties | online |
2002 | eprint | Secret sharing schemes with three or four minimal qualified subsets | online |
2002 | eprint | Fully Distributed Proxy Signature Schemes | online |
2002 | eprint | A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order | online |
2002 | eprint | Extended Validity and Consistency in Byzantine Agreement | online |
2002 | eprint | SiBIR: Signer-Base Intrusion-Resilient Signatures | online |
2002 | eprint | Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity | online |
2002 | eprint | Hierarchical ID-Based Cryptography | online |
2002 | eprint | A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions | online |
2002 | eprint | Construction of UOWHF: Tree Hashing Revisited | online |
2002 | eprint | Universally Composable Notions of Key Exchange and Secure Channels | online |
2002 | eprint | A Forward-Secure Public-Key Encryption Scheme | online |
2002 | eprint | Strengthened Encryption in the CBC Mode | online |
2002 | eprint | ABC - A Block Cipher | online |
2002 | eprint | On some Attacks on Multi-prime RSA | online |
2002 | eprint | Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold | online |
2002 | eprint | Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization | online |
2002 | eprint | Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV | online |
2002 | eprint | (Not So) Random Shuffles of RC4 | online |
2002 | eprint | Improved key recovery of level 1 of the Bluetooth Encryption System | online |
2002 | eprint | A Distributed and Computationally Secure Key Distribution Scheme | online |
2002 | eprint | Weak Keys in MST1 | online |
2002 | eprint | Further Results and Considerations on Side Channel Attacks on RSA | online |
2002 | eprint | Authenticated Identity-Based Encryption | online |
2002 | eprint | Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures | online |
2002 | eprint | How to repair ESIGN | online |
2002 | eprint | Fault based cryptanalysis of the Advanced Encryption Standard | online |
2002 | eprint | Attack on Private Signature Keys of the OpenPGP Format, PGP(TM) Programs and Other Applications Compatible with OpenPGP | online |
2002 | eprint | Key-Insulated Public-Key Cryptosystems | online |
2002 | eprint | On the efficiency of the Clock Control Guessing Attack | online |
2002 | eprint | Applications of Multilinear Forms to Cryptography | online |
2002 | eprint | Some Applications of Threshold Signature Schemes to Distributed Protocols | online |
2002 | eprint | Authentication of Quantum Messages | online |
2002 | eprint | A semantically secure elliptic curve RSA scheme with small expansion factor | online |
2002 | eprint | Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer | online |
2002 | eprint | Efficient and Player-Optimal Strong Consensus | online |
2002 | eprint | Adapting the weaknesses of the Random Oracle model to the Generic Group model | online |
2002 | eprint | Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt | online |
2002 | eprint | Constructing Elliptic Curves with Prescribed Embedding Degrees | online |
2002 | eprint | On Chosen Ciphertext Security of Multiple Encryptions | online |
2002 | eprint | Efficient and Concurrent Zero-Knowledge from any public coin HVZK protocol | online |
2002 | eprint | Multiplicative Masking and Power Analysis of AES | online |
2002 | eprint | TMAC: Two-Key CBC MAC | online |
2002 | eprint | A Fuzzy Vault Scheme | online |
2002 | eprint | Building curves with arbitrary small MOV degree over finite prime fields | online |
2002 | eprint | The (a, b)-Shrinking Generator | online |
2002 | eprint | Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank | online |
2002 | eprint | A new public key encryption scheme provably secure against adaptive chosen cipher-text attack | online |
2002 | eprint | Identity-Based Signcryption | online |
2002 | eprint | A New Statistical Testing for Symmetric Ciphers and Hash Functions | online |
2002 | eprint | Encryption-Scheme Security in the Presence of Key-Dependent Messages | online |
2002 | eprint | An Upper Bound on the Size of a Code with the $k$-Identifiable Parent Property | online |
2002 | eprint | Applying General Access Structure to Metering Schemes | online |
2002 | eprint | On the Power of Claw-Free Permutations | online |
2002 | eprint | Forward-Secure Signatures with Fast Key Update | online |
2002 | eprint | An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2 | online |
2002 | eprint | Secret sharing schemes on access structures with intersection number equal to one | online |
2002 | eprint | Efficient Arithmetic on Hyperelliptic Curves | online |
2002 | eprint | Clock-Controlled Alternating Step Generator | online |
2002 | eprint | A New Class of Unsafe Primes | online |
2002 | eprint | The GGM Construction does NOT yield Correlation Intractable Function Ensembles | online |
2002 | eprint | On Linear Redundancy in the AES S-Box | online |
2002 | eprint | An Efficient Procedure to Double and Add Points on an Elliptic Curve | online |
2002 | eprint | A Note on the Bilinear Diffie-Hellman Assumption | online |
2002 | eprint | Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three | online |
2002 | eprint | Universal Padding Schemes for RSA | online |
2002 | eprint | How to convert any ID-based Signature Schemes | online |
2002 | eprint | Diffie-Hellman Problems and Bilinear Maps | online |
2002 | eprint | Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme | online |
2002 | eprint | Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes | online |
2002 | eprint | Security Analysis of IKE's Signature-based Key-Exchange Protocol | online |
2002 | eprint | Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae | online |
2002 | eprint | ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings | online |
2002 | eprint | New covering radius of Reed-Muller codes for $t$-resilient functions | online |
2002 | eprint | On Optimal Hash Tree Traversal for Interval Time-Stamping | online |
2002 | eprint | The Jacobi Model of an Elliptic Curve and Side-Channel Analysis | online |
2002 | eprint | Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference | online |
2002 | eprint | Power of a Public Random Permutation and its Application to Authenticated-Encryption | online |
2002 | eprint | Perfectly Secure Message Transmission Revisited | online |
2002 | eprint | Key-collisions in (EC)DSA: Attacking Non-repudiation | online |
2002 | eprint | OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives | online |
2002 | eprint | An Improved Pseudorandom Generator Based on Hardness of Factoring | online |
2002 | eprint | Tight Lower Bound on Linear Authenticated Encryption | online |
2002 | eprint | Efficient Construction of (Distributed) Verifiable Random Functions | online |
2002 | eprint | Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems | online |
2002 | eprint | Tolerant Combiners: Resilient Cryptographic Design | online |
2002 | eprint | Practical Non-Interactive Key Distribution Based on Pairings | online |
2002 | eprint | Provably Secure Steganography | online |
2002 | eprint | On the Security of HFE, HFEv- and Quartz | online |
2002 | eprint | Reaction Attacks on Public Key Cryptosystems Based on the Word Problem | online |
2002 | eprint | Universally Composable Two-Party and Multi-Party Secure Computation | online |
2002 | eprint | Applying General Access Structure to Proactive Secret Sharing Schemes | online |
2002 | eprint | On the Applicability of Distinguishing Attacks Against Stream Ciphers | online |
2002 | eprint | An Attack on the Isomorphisms of Polynomials Problem with One Secret | online |
2002 | eprint | On Some Algebraic Structures in the AES Round Function | online |
2002 | eprint | Cryptanalysis of MQV with partially known nonces | online |
2002 | eprint | Bauer-Berson-Feiertag attack revisited | online |
2002 | eprint | Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves | online |
2002 | eprint | The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP) | online |
2002 | eprint | About Filliol's Observations on DES, AES and Hash Functions (draft) | online |
2002 | eprint | Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes | online |
2002 | eprint | Selective disclosure credential sets | online |
2002 | eprint | A note on Weak Keys of PES, IDEA and some Extended Variants | online |
2002 | eprint | Weighted Coordinates on Genus 2 Hyperelliptic Curves | online |
2002 | eprint | On multi-exponentiation in cryptography | online |
2002 | eprint | Secure Bilinear Diffie-Hellman Bits | online |
2002 | eprint | Validating Digital Signatures without Time-Stamping and Certificate Revocation | online |
2002 | eprint | In How Many Ways Can You Write Rijndael? | online |
2002 | eprint | The Book of Rijndaels | online |
2002 | eprint | Related-Key and Key-Collision Attacks Against RMAC | online |
2002 | eprint | Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks | online |
2002 | eprint | Practical Verifiable Encryption and Decryption of Discrete Logarithms | online |
2002 | eprint | On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model | online |
2002 | eprint | Man-in-the-Middle in Tunnelled Authentication Protocols | online |
2002 | eprint | Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number | online |
2002 | eprint | Coercion-Resistant Electronic Elections | online |
2002 | eprint | Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms | online |
2002 | eprint | Cryptanalysis of Two New Signature Schemes | online |
2002 | eprint | New Signature Scheme Using Conjugacy Problem | online |
2002 | eprint | Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel | online |
2002 | eprint | An Analysis of RMAC | online |
2002 | eprint | Statistical weaknesses in the alleged RC4 keystream generator | online |
2002 | eprint | PECDSA. How to build a DL-based digital signature scheme with the best proven security | online |
2002 | eprint | Efficient Group Signatures without Trapdoors | online |
2002 | eprint | A Designer's Guide to KEMs | online |
2002 | eprint | Aggregate and Verifiably Encrypted Signatures from Bilinear Maps | online |
2002 | eprint | Theoretical Analysis of ``Correlations in RC6'' | online |
2002 | eprint | two attacks on xia-you Group Signature | online |
2002 | eprint | Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433) | online |
2002 | eprint | Parallel Algorithm for Multiplication on Elliptic Curves | online |
2002 | eprint | OMAC: One-Key CBC MAC | online |
2002 | eprint | Counting Points for Hyperelliptic Curves of type $y^2=x^5+ax$ over Finite Prime Fields | online |
2002 | eprint | Oblivious Keyword Search | online |
2002 | eprint | Simple backdoors to RSA key generation | online |
2002 | eprint | Identity Based Authenticated Key Agreement Protocols from Pairings | online |
2002 | eprint | Turing, a fast stream cipher | online |
2002 | eprint | Zero-Knowledge twenty years after its invention | online |
2002 | eprint | Entity Authentication Schemes Using Braid Word Reduction | online |
2002 | eprint | Key recovery attacks on NTRU without ciphertext validation routine | online |
2002 | eprint | Bit-Slice Auction Circuit | online |
2002 | eprint | Parallelizable Authentication Trees | online |
2002 | eprint | A Linearization Attack on the Bluetooth Key Stream Generator | online |
2002 | eprint | Security Proofs for an Efficient Password-Based Key Exchange | online |
2002 | eprint | A Note on Ideal Tripartite Access Structures | online |
2002 | eprint | A polarisation based Visual Crypto System and its Secret Sharing Schemes | online |
2002 | eprint | An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes | online |
2002 | eurocrypt | On Deniability in Quantum Key Exchange | online |
2002 | eurocrypt | Cryptanalysis of a Pseudorandom Generator Based on Braid Groups | online |
2002 | eurocrypt | A Block-Cipher Mode of Operation for Parallelizable Message Authentication | online |
2002 | eurocrypt | Cryptanalysis of the Revised NTRU Signature Scheme | online |
2002 | eurocrypt | Performance Analysis and Parallel Implementation of Dedicated Hash Functions | online |
2002 | eurocrypt | Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods | online |
2002 | eurocrypt | Cryptanalysis of SFLASH | online |
2002 | eurocrypt | Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS | online |
2002 | eurocrypt | Indistinguishability of Random Systems | online |
2002 | eurocrypt | Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch | online |
2002 | eurocrypt | Cryptography in an Unbounded Computational Model | online |
2002 | eurocrypt | Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions | online |
2002 | eurocrypt | Linear Cryptanalysis of Bluetooth Stream Cipher | online |
2002 | eurocrypt | Fast Correlation Attacks: An Algorithmic Point of View | online |
2002 | eurocrypt | Fault Injection and a Timing Channel on an Analysis Technique | online |
2002 | eurocrypt | Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms | online |
2002 | eurocrypt | Optimal Security Proofs for PSS and Other Signature Schemes | online |
2002 | eurocrypt | Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings | online |
2002 | eurocrypt | Universally Composable Notions of Key Exchange and Secure Channels | online |
2002 | eurocrypt | Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption | online |
2002 | eurocrypt | Rethinking PKI: What's Trust Got to Do with It? | online |
2002 | eurocrypt | Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis | online |
2002 | eurocrypt | Traitor Tracing with Constant Transmission Rate | online |
2002 | eurocrypt | Toward Hierarchical Identity-Based Encryption | online |
2002 | eurocrypt | From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security | online |
2002 | eurocrypt | AES and the Wide Trail Design Strategy | online |
2002 | eurocrypt | Security Notions for Unconditionally Secure Signature Schemes | online |
2002 | eurocrypt | Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups | online |
2002 | eurocrypt | BDD-Based Cryptanalysis of Keystream Generators | online |
2002 | eurocrypt | On the Security of Joint Signature and Encryption | online |
2002 | eurocrypt | A Practice-Oriented Treatment of Pseudorandom Number Generators | online |
2002 | eurocrypt | How to Fool an Unbounded Adversary with a Short Key | online |
2002 | eurocrypt | Perfectly Secure Message Transmission Revisited | online |
2002 | eurocrypt | Extending the GHS Weil Descent Attack | online |
2002 | eurocrypt | Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups | online |
2002 | eurocrypt | Key-Insulated Public Key Cryptosystems | online |
2002 | fse | Non-cryptographic Primitive for Pseudorandom Permutation | online |
2002 | fse | On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction | online |
2002 | fse | Compression and Information Leakage of Plaintext | online |
2002 | fse | Integral Cryptanalysis | online |
2002 | fse | Improved Cryptanalysis of MISTY1 | online |
2002 | fse | Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA | online |
2002 | fse | Saturation Attacks on Reduced Round Skipjack | online |
2002 | fse | Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers | online |
2002 | fse | A Time-Memory Tradeoff Attack Against LILI-128 | online |
2002 | fse | A New Keystream Generator MUGI | online |
2002 | fse | The Round Functions of RIJNDAEL Generate the Alternating Group | online |
2002 | fse | Differential and Linear Cryptanalysis of a Reduced-Round SC2000 | online |
2002 | fse | On the Security of CAMELLIA against the Square Attack | online |
2002 | fse | Multiple Linear Cryptanalysis of a Reduced Round RC6 | online |
2002 | fse | Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia | online |
2002 | fse | Linearity Properties of the SOBER-t32 Key Loading | online |
2002 | fse | BeepBeep: Embedded Real-Time Encryption | online |
2002 | fse | New Results on Boomerang and Rectangle Attacks | online |
2002 | fse | Distinguishing Attacks on SOBER-t16 and t32 | online |
2002 | fse | Multiplicative Differentials | online |
2002 | fse | Scream: A Software-Efficient Stream Cipher | online |
2002 | fse | Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98 | online |
2002 | jofc | A Note on Negligible Functions | 271-284 |
2002 | jofc | Elliptic Curve Paillier Schemes | 129-138 |
2002 | jofc | Cryptanalysis of the ANSI X9.52 CBCM Mode | 47-59 |
2002 | jofc | Constructive and Destructive Facets of Weil Descent on Elliptic Curves | 19-46 |
2002 | jofc | Paillier's Trapdoor Function Hides up to O(n) Bits | 251-269 |
2002 | jofc | Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack | 139-148 |
2002 | jofc | The Security of Feistel Ciphers with Six Rounds or Less | 207-222 |
2002 | jofc | Privacy Preserving Data Mining | 177-206 |
2002 | jofc | New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups | 285-297 |
2002 | jofc | Improving the Exact Security of Digital Signature Schemes | 1-18 |
2002 | jofc | A Cipher Based on Data-Dependent Permutations | 61-72 |
2002 | jofc | Constructing Pseudo-Random Permutations with a Prescribed Structure | 97-102 |
2002 | jofc | The Insecurity of the Digital Signature Algorithm with Partially Known Nonces | 151-176 |
2002 | jofc | OAEP Reconsidered | 223-249 |
2002 | jofc | Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) | 103-127 |
2002 | jofc | Securing Threshold Cryptosystems against Chosen Ciphertext Attack | 75-96 |
2002 | pkc | Formal Proofs for the Security of Signcryption | 80-98 |
2002 | pkc | Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code | 64-79 |
2002 | pkc | Weierstraß Elliptic Curves and Side-Channel Attacks | 335-345 |
2002 | pkc | Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages | 17-33 |
2002 | pkc | Client/Server Tradeoffs for Online Elections | 125-140 |
2002 | pkc | A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks | 280-296 |
2002 | pkc | Solving Underdefined Systems of Multivariate Quadratic Equations | 211-227 |
2002 | pkc | One-Way Cross-Trees and Their Applications | 346-356 |
2002 | pkc | New Minimal Modified Radix-r Representation with Applications to Smart Cards | 375-384 |
2002 | pkc | RSA Key Generation with Verifiable Randomness | 357-374 |
2002 | pkc | On Sufficient Randomness for Secure Public-Key Cryptosystems | 34-47 |
2002 | pkc | Multi-recipient Public-Key Encryption with Shortened Ciphertext | 48-63 |
2002 | pkc | Linear Code Implies Public-Key Traitor Tracing | 172-187 |
2002 | pkc | Design and Security Analysis of Anonymous Group Identification Protocols | 188-198 |
2002 | pkc | Selective Forgery of RSA Signatures with Fixed-Pattern Padding | 228-236 |
2002 | pkc | A Provably Secure Restrictive Partially Blind Signature Scheme | 99-114 |
2002 | pkc | SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation | 252-262 |
2002 | pkc | An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves | 323-334 |
2002 | pkc | An Improved Method of Multiplication on Certain Elliptic Curves | 310-322 |
2002 | pkc | New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report | 297-309 |
2002 | pkc | On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem | 199-210 |
2002 | pkc | New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive | 1-16 |
2002 | pkc | A Combined Timing and Power Attack | 263-279 |
2002 | pkc | Efficient 1-Out-n Oblivious Transfer Schemes | 159-171 |
2002 | pkc | Self-tallying Elections and Perfect Ballot Secrecy | 141-158 |
2002 | pkc | Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings | online |
2002 | pkc | New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 | 237-251 |
2002 | pkc | M+1-st Price Auction Using Homomorphic Encryption | 115-124 |