EUROCRYPT 2002: Amsterdam, The Netherlands
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project
Lars R. Knudsen (Ed.): Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings. Lecture Notes in Computer Science 2332 Springer 2002, ISBN 3-540-43553-0 BibTeX
PREFACE by the Program Chair ( .ps )
Sponsored by the International Association for Cryptologic Research (IACR)
in cooperation with
IEEE Computer Society Technical Committee on Security and Privacy,
and the Computer Science Department, University of California, Santa Barbara
General Chair
Berry Schoenmakers
Program Chair
Lars Knudsen
Adam Back, Alfred Menezes, Alice Silverberg |
Anton Stiglic, Antoon Bosselaers, Ari Juels |
Barry Trager, Carlo Blundo, Chan Sup Park |
Chong Hee Kim, Christian Paquin, Christophe De Cannière |
Craig Gentry, Dae Hyun Yum, Dan Bernstein |
Dario Catalano, David Pointcheval, David Wagner, |
Dong Jin Park, Dorian Goldfeld, Eliane Jaulmes, |
Emmanuel Bresson, Florian Hess, Frederik Vercauteren |
Frédéric Légaré, Frédéric Valette, Glenn Durfee |
Guillaume Poupard, Gwenaelle Martinet, Han Pil Kim |
Hein Roehrig, Hovav Shacham, Ilya Mironov |
Jacques Stern, Jae Eun Kang, Jan Camenisch |
Jean-Francois, Raymond Jens Jensen, Jesper Buus Nielsen |
Jim Hughes, John Malone-Lee, Jonathan Poritz, |
Jong Hoon Shin, Katsuyuki Takashima, Kazue Sako |
Kenny Paterson, Kyung Weon Kim, Leo Reyzin |
Louis Granboulan, Louis Salvail, Markku-Juhani O. Saarinen |
Matt Robshaw, Michael Quisquater, Michael Waidner |
Michel Mitton, Mike Szydlo, Mike Wiener |
Moti Yung, Olivier Baudron, Omer Reingold |
Paul Dumais, Paul Kocher, Philippe Chose |
Philippe Golle, Pierre-Alain Fouque, Ran Canetti |
Richard Jozsa, Ronald Cramer, Sang Gyoo Sim |
Sang Jin Lee, Serge Fehr, Shirish Altekar |
Simon Blackburn, Stefan Wolf, Steven Galbraith |
Svetla Nikova, Tae Gu Kim, Tal Malkin |
Tal Rabin, Tetsu Iwata, Toshio Hasegawa |
Tsuyoshi Nishioka, Virgil Gligor, Wenbo Mao |
Yeon Kyu Park, Yiqun Lisa Yin, Yong Ho Hwang |
Yuval Ishai |
Table of Contents
Cryptanalysis I
-
Rosario Gennaro
,
Daniele Micciancio
:
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups . 1-13
BibTeX -
Sangjin Lee
,
Eonkyung Lee
:
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups . (.ps) 14-28
BibTeX -
Steven D. Galbraith
,
Florian Hess
,
Nigel P. Smart
:
Extending the GHS Weil Descent Attack. (.ps) 29-44
BibTeX
Public-Key Enryption
-
Ronald Cramer
,
Victor Shoup
:
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. (.ps) 45-64
BibTeX -
Yevgeniy Dodis
,
Jonathan Katz
,
Shouhuai Xu
,
Moti Yung
:
Key-Insulated Public Key Cryptosystems. (.ps) 65-82
BibTeX -
Jee Hea An
,
Yevgeniy Dodis
,
Tal Rabin
:
On the Security of Joint Signature and Encryption. (.ps) 83-107
BibTeX
Invited Talk
Information Theory & New Models
-
Ueli M. Maurer
:
Indistinguishability of Random Systems. 110-132
BibTeX -
Alexander Russell
,
Hong Wang
:
How to Fool an Unbounded Adversary with a Short Key. (.ps) 133-148
BibTeX -
David P. Woodruff
,
Marten van Dijk
:
Cryptography in an Unbounded Computational Model (.ps) 149-164
BibTeX
Implementational Analysis
-
Junko Nakajima
,
Mitsuru Matsui
:
Performance Analysis and Parallel Implementation of Dedicated Hash Functions (.ps) 165-180
BibTeX -
John A. Clark
,
Jeremy L. Jacob
:
Fault Injection and a Timing Channel on an Analysis Technique (.ps) 181-196
BibTeX -
Young-Ho Park
,
Sangtae Jeong
,
Jongin Lim
:
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms (.ps) 197-208
BibTeX
Stream Ciphers
-
Philippe Chose
,
Antoine Joux
,
Michel Mitton
:
Fast Correlation Attacks: An Algorithmic Point of View (.ps) 209-221
BibTeX -
Matthias Krause
:
BDD-Based Cryptanalysis of Keystream Generators (.ps) 222-237
BibTeX -
Jovan Dj. Golic
,
Vittorio Bagini
,
Guglielmo Morgari
:
Linear Cryptanalysis of Bluetooth Stream Cipher (.ps) 238-255
BibTeX
Digital Signatures I
-
Ivan Damgård
,
Maciej Koprowski
:
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups (.ps) 256-271
BibTeX -
Jean-Sébastien Coron
:
Optimal Security Proofs for PSS and Other Signature Schemes (.ps) 272-287
BibTeX
Cryptanalysis II
-
Henri Gilbert
,
Marine Minier
:
Cryptanalysis of SFLASH (.ps) 288-298
BibTeX -
Craig Gentry
,
Michael Szydlo
:
Cryptanalysis of the Revised NTRU Signature Scheme (.ps) 299-320
BibTeX
Key Exchange
-
Emmanuel Bresson
,
Olivier Chevassut
,
David Pointcheval
:
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions (.ps) 321-336
BibTeX -
Ran Canetti
,
Hugo Krawczyk
:
Universally Composable Notions of Key Exchange and Secure Channels 337-351
BibTeX -
Donald Beaver
:
On Deniability in Quantum Key Exchange (.ps) 352-367
BibTeX
Modes of Operation
-
Anand Desai
,
Alejandro Hevia
,
Yiqun Lisa Yin
:
A Practice-Oriented Treatment of Pseudorandom Number Generators (.ps) 368-383
BibTeX -
John Black
,
Phillip Rogaway
:
A Block-Cipher Mode of Operation for Parallelizable Message Authentication (.ps) 384-397
BibTeX
Invited Talk
Digital Signatures II
-
Tal Malkin
,
Daniele Micciancio
,
Sara K. Miner
:
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods (.ps) 400-417
BibTeX -
Michel Abdalla
,
Jee Hea An
,
Mihir Bellare
,
Chanathip Namprempre
:
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security (.ps) 418-433
BibTeX -
Junji Shikata
,
Goichiro Hanaoka
,
Yuliang Zheng
,
Hideki Imai
:
Security Notions for Unconditionally Secure Signature Schemes (.ps) 434-449
BibTeX
Traitor Tracing & Id-Based Encryption
-
Aggelos Kiayias
,
Moti Yung
:
Traitor Tracing with Constant Transmission Rate (.ps) 450-465
BibTeX -
Jeremy Horwitz
,
Ben Lynn
:
Toward Hierarchical Identity-Based Encryption (.ps) 466-481
BibTeX
Multiparty and Multicast
-
Matthias Fitzi
,
Nicolas Gisin
,
Ueli M. Maurer
,
Oliver von Rotz
:
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch (.ps) 482-501
BibTeX -
Yvo Desmedt
,
Yongge Wang
:
Perfectly Secure Message Transmission Revisited (.ps) 502-517
BibTeX
Symmetric Cryptology
-
Anne Canteaut
,
Marion Videau
:
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis (.ps) 518-533
BibTeX -
Serge Vaudenay
:
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS ... (.ps) 534-546
BibTeX