Proceedings of CRYPTO 2002
Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings
, Springer
- Essential Algebraic Structure within the AES., Sean Murphy, Matthew J. B. Robshaw, pp. 1-16
- PDF postscript BibTeX
- Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC., Antoine Joux, Gwenaëlle Martinet, Frédéric Valette, pp. 17-30
- PDF postscript BibTeX
- Tweakable Block Ciphers., Moses Liskov, Ronald L. Rivest, David Wagner, pp. 31-46
- PDF postscript BibTeX
- The LSD Broadcast Encryption Scheme., Dani Halevy, Adi Shamir, pp. 47-60
- postscript BibTeX
- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials., Jan Camenisch, Anna Lysyanskaya, pp. 61-76
- PDF postscript BibTeX
- Provably Secure Steganography., Nicholas J. Hopper, John Langford, Luis von Ahn, pp. 77-92
- PDF postscript BibTeX
- Flaws in Applying Proof Methodologies to Signature Schemes., Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart, pp. 93-110
- PDF postscript BibTeX
- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case., Jesper Buus Nielsen, pp. 111-126
- PDF postscript BibTeX
- On the Security of RSA Encryption in TLS., Jakob Jonsson, Burton S. Kaliski Jr., pp. 127-142
- PDF postscript BibTeX
- Security Analysis of IKE's Signature-Based Key-Exchange Protocol., Ran Canetti, Hugo Krawczyk, pp. 143-161
- PDF postscript BibTeX
- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks., Mihir Bellare, Adriana Palacio, pp. 162-177
- PDF postscript BibTeX
- On 2-Round Secure Multiparty Computation., Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin, pp. 178-193
- PDF postscript BibTeX
- Private Computation - k-Connected versus 1-Connected Networks., Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Siebert, pp. 194-209
- PDF postscript BibTeX
- Analysis and Improvements of NTRU Encryption Paddings., Phong Q. Nguyen, David Pointcheval, pp. 210-225
- PDF postscript BibTeX
- Universal Padding Schemes for RSA., Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier, pp. 226-241
- PDF postscript BibTeX
- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent., Alexander May, pp. 242-256
- PDF postscript BibTeX
- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors., Chi-Jen Lu, pp. 257-271
- PDF postscript BibTeX
- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups., Ronald Cramer, Serge Fehr, pp. 272-287
- PDF postscript BibTeX
- A Generalized Birthday Problem., David Wagner, pp. 288-303
- PDF postscript BibTeX
- (Not So) Random Shuffles of RC4., Ilya Mironov, pp. 304-319
- PDF postscript BibTeX
- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV., John Black, Phillip Rogaway, Thomas Shrimpton, pp. 320-335
- PDF postscript BibTeX
- Supersingular Abelian Varieties in Cryptology., Karl Rubin, Alice Silverberg, pp. 336-353
- PDF postscript BibTeX
- Efficient Algorithms for Pairing-Based Cryptosystems., Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, Michael Scott, pp. 354-368
- PDF postscript BibTeX
- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2., Frederik Vercauteren, pp. 369-384
- PDF postscript BibTeX
- Threshold Password-Authenticated Key Exchange., Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson, pp. 385-400
- PDF postscript BibTeX
- A Threshold Pseudorandom Function Construction and Its Applications., Jesper Buus Nielsen, pp. 401-416
- PDF postscript BibTeX
- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products., Joy Algesheimer, Jan Camenisch, Victor Shoup, pp. 417-432
- PDF postscript BibTeX
- Hidden Number Problem with the Trace and Bit Security of XTR and LUC., Wen-Ching W. Li, Mats Näslund, Igor Shparlinski, pp. 433-448
- PDF postscript BibTeX
- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security., Ivan Damgård, Jesper Buus Nielsen, pp. 449-464
- postscript BibTeX
- Threshold Ring Signatures and Applications to Ad-hoc Groups., Emmanuel Bresson, Jacques Stern, Michael Szydlo, pp. 465-480
- PDF postscript BibTeX
- Deniable Ring Authentication., Moni Naor, pp. 481-498
- PDF postscript BibTeX
- SiBIR: Signer-Base Intrusion-Resilient Signatures., Gene Itkis, Leonid Reyzin, pp. 499-514
- PDF postscript BibTeX
- Cryptanalysis of Stream Ciphers with Linear Masking., Don Coppersmith, Shai Halevi, Charanjit S. Jutla, pp. 515-532
- PDF postscript BibTeX
- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers., Palash Sarkar, pp. 533-548
- PDF postscript BibTeX
- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction., Claude Carlet, pp. 549-564
- PDF postscript BibTeX
- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks., Serge Fehr, Ueli M. Maurer, pp. 565-580
- PDF postscript BibTeX
- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor., Ivan Damgård, Jesper Buus Nielsen, pp. 581-596
- PDF postscript BibTeX
- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation., Anna Lysyanskaya, pp. 597-612
- PDF postscript BibTeX
- Security Proof for Partial-Domain Hash Signature Schemes., Jean-Sébastien Coron, pp. 613-626
- PDF postscript BibTeX
[ IACR home page ]
© IACR