Proceedings of ASIACRYPT 2002
Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings
, Springer
- Analysis of Bernstein's Factorization Circuit., Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer, pp. 1-26
- PDF postscript BibTeX
- A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order., Stefan Lucks, pp. 27-45
- PDF postscript BibTeX
- Looking beyond XTR., Wieb Bosma, James Hutton, Eric R. Verheul, pp. 46-63
- PDF postscript BibTeX
- Bounds for Robust Metering Schemes and Their Relationship with A-code., Wakaha Ogata, Kaoru Kurosawa, pp. 64-80
- PDF postscript BibTeX
- Unconditionally Secure Anonymous Encryption and Group Authentication., Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai, pp. 81-99
- PDF postscript BibTeX
- Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model., Alexander W. Dent, pp. 100-109
- PDF postscript BibTeX
- On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives., Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu, pp. 110-124
- PDF postscript BibTeX
- A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order., Ivan Damgård, Eiichiro Fujisaki, pp. 125-142
- PDF postscript BibTeX
- Efficient Oblivious Transfer in the Bounded-Storage Model., Dowon Hong, Ku-Young Chang, Heuisu Ryu, pp. 143-159
- PDF postscript BibTeX
- In How Many Ways Can You Write Rijndael?, Elad Barkan, Eli Biham, pp. 160-175
- PDF postscript BibTeX
- On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis., Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim, pp. 176-191
- PDF postscript BibTeX
- Threshold Cryptosystems Based on Factoring., Jonathan Katz, Moti Yung, pp. 192-205
- PDF postscript BibTeX
- Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments., Masayuki Abe, Ronald Cramer, Serge Fehr, pp. 206-223
- PDF postscript BibTeX
- Asynchronous Secure Communication Tolerating Mixed Adversaries., K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan, pp. 224-242
- PDF postscript BibTeX
- Amplified Boomerang Attack against Reduced-Round SHACAL., Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung, pp. 243-253
- PDF postscript BibTeX
- Enhancing Differential-Linear Cryptanalysis., Eli Biham, Orr Dunkelman, Nathan Keller, pp. 254-266
- PDF postscript BibTeX
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations., Nicolas Courtois, Josef Pieprzyk, pp. 267-287
- PDF postscript BibTeX
- Analysis of Neural Cryptography., Alexander Klimov, Anton Mityagin, Adi Shamir, pp. 288-298
- PDF postscript BibTeX
- The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm., Dario Catalano, Phong Q. Nguyen, Jacques Stern, pp. 299-310
- PDF postscript BibTeX
- A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2., Pierrick Gaudry, pp. 311-327
- PDF postscript BibTeX
- A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme., Hiroki Koga, pp. 328-345
- PDF postscript BibTeX
- On Unconditionally Secure Robust Distributed Key Distribution Centers., Paolo D'Arco, Douglas R. Stinson, pp. 346-363
- PDF postscript BibTeX
- Short Signatures in the Random Oracle Model., Louis Granboulan, pp. 364-378
- PDF postscript BibTeX
- The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes., Alejandro Hevia, Daniele Micciancio, pp. 379-396
- PDF postscript BibTeX
- Transitive Signatures Based on Factoring and RSA., Mihir Bellare, Gregory Neven, pp. 397-414
- PDF postscript BibTeX
- 1-out-of-n Signatures from a Variety of Keys., Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki, pp. 415-432
- PDF postscript BibTeX
- A Revocation Scheme with Minimal Storage at Receivers., Tomoyuki Asano, pp. 433-450
- PDF postscript BibTeX
- Optimistic Mixing for Exit-Polls., Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels, pp. 451-465
- PDF postscript BibTeX
- Improved Construction of Nonlinear Resilient S-Boxes., Kishan Chand Gupta, Palash Sarkar, pp. 466-483
- PDF postscript BibTeX
- An Upper Bound on the Number of m-Resilient Boolean Functions., Claude Carlet, Aline Gouget, pp. 484-496
- PDF postscript BibTeX
- Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks., Emmanuel Bresson, Olivier Chevassut, David Pointcheval, pp. 497-514
- PDF postscript BibTeX
- Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization., Chanathip Namprempre, pp. 515-532
- PDF postscript BibTeX
- ID-Based Blind Signature and Ring Signature from Pairings., Fangguo Zhang, Kwangjo Kim, pp. 533-547
- PDF postscript BibTeX
- Hierarchical ID-Based Cryptography., Craig Gentry, Alice Silverberg, pp. 548-566
- PDF postscript BibTeX
- Crypto-integrity., Moti Yung, pp. 567-573
- PDF postscript BibTeX
- Gummy and Conductive Silicone Rubber Fingers., Tsutomu Matsumoto, pp. 574-576
- PDF postscript BibTeX
[ IACR home page ]
© IACR