IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of CRYPTO 2002

Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings , Springer
Essential Algebraic Structure within the AES., Sean Murphy, Matthew J. B. Robshaw, pp. 1-16
 PDF  postscript BibTeX
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC., Antoine Joux, Gwenaëlle Martinet, Frédéric Valette, pp. 17-30
 PDF  postscript BibTeX
Tweakable Block Ciphers., Moses Liskov, Ronald L. Rivest, David Wagner, pp. 31-46
 PDF  postscript BibTeX
The LSD Broadcast Encryption Scheme., Dani Halevy, Adi Shamir, pp. 47-60
 postscript BibTeX
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials., Jan Camenisch, Anna Lysyanskaya, pp. 61-76
 PDF  postscript BibTeX
Provably Secure Steganography., Nicholas J. Hopper, John Langford, Luis von Ahn, pp. 77-92
 PDF  postscript BibTeX
Flaws in Applying Proof Methodologies to Signature Schemes., Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart, pp. 93-110
 PDF  postscript BibTeX
Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case., Jesper Buus Nielsen, pp. 111-126
 PDF  postscript BibTeX
On the Security of RSA Encryption in TLS., Jakob Jonsson, Burton S. Kaliski Jr., pp. 127-142
 PDF  postscript BibTeX
Security Analysis of IKE's Signature-Based Key-Exchange Protocol., Ran Canetti, Hugo Krawczyk, pp. 143-161
 PDF  postscript BibTeX
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks., Mihir Bellare, Adriana Palacio, pp. 162-177
 PDF  postscript BibTeX
On 2-Round Secure Multiparty Computation., Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin, pp. 178-193
 PDF  postscript BibTeX
Private Computation - k-Connected versus 1-Connected Networks., Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Siebert, pp. 194-209
 PDF  postscript BibTeX
Analysis and Improvements of NTRU Encryption Paddings., Phong Q. Nguyen, David Pointcheval, pp. 210-225
 PDF  postscript BibTeX
Universal Padding Schemes for RSA., Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier, pp. 226-241
 PDF  postscript BibTeX
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent., Alexander May, pp. 242-256
 PDF  postscript BibTeX
Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors., Chi-Jen Lu, pp. 257-271
 PDF  postscript BibTeX
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups., Ronald Cramer, Serge Fehr, pp. 272-287
 PDF  postscript BibTeX
A Generalized Birthday Problem., David Wagner, pp. 288-303
 PDF  postscript BibTeX
(Not So) Random Shuffles of RC4., Ilya Mironov, pp. 304-319
 PDF  postscript BibTeX
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV., John Black, Phillip Rogaway, Thomas Shrimpton, pp. 320-335
 PDF  postscript BibTeX
Supersingular Abelian Varieties in Cryptology., Karl Rubin, Alice Silverberg, pp. 336-353
 PDF  postscript BibTeX
Efficient Algorithms for Pairing-Based Cryptosystems., Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, Michael Scott, pp. 354-368
 PDF  postscript BibTeX
Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2., Frederik Vercauteren, pp. 369-384
 PDF  postscript BibTeX
Threshold Password-Authenticated Key Exchange., Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson, pp. 385-400
 PDF  postscript BibTeX
A Threshold Pseudorandom Function Construction and Its Applications., Jesper Buus Nielsen, pp. 401-416
 PDF  postscript BibTeX
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products., Joy Algesheimer, Jan Camenisch, Victor Shoup, pp. 417-432
 PDF  postscript BibTeX
Hidden Number Problem with the Trace and Bit Security of XTR and LUC., Wen-Ching W. Li, Mats Näslund, Igor Shparlinski, pp. 433-448
 PDF  postscript BibTeX
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security., Ivan Damgård, Jesper Buus Nielsen, pp. 449-464
 postscript BibTeX
Threshold Ring Signatures and Applications to Ad-hoc Groups., Emmanuel Bresson, Jacques Stern, Michael Szydlo, pp. 465-480
 PDF  postscript BibTeX
Deniable Ring Authentication., Moni Naor, pp. 481-498
 PDF  postscript BibTeX
SiBIR: Signer-Base Intrusion-Resilient Signatures., Gene Itkis, Leonid Reyzin, pp. 499-514
 PDF  postscript BibTeX
Cryptanalysis of Stream Ciphers with Linear Masking., Don Coppersmith, Shai Halevi, Charanjit S. Jutla, pp. 515-532
 PDF  postscript BibTeX
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers., Palash Sarkar, pp. 533-548
 PDF  postscript BibTeX
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction., Claude Carlet, pp. 549-564
 PDF  postscript BibTeX
Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks., Serge Fehr, Ueli M. Maurer, pp. 565-580
 PDF  postscript BibTeX
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor., Ivan Damgård, Jesper Buus Nielsen, pp. 581-596
 PDF  postscript BibTeX
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation., Anna Lysyanskaya, pp. 597-612
 PDF  postscript BibTeX
Security Proof for Partial-Domain Hash Signature Schemes., Jean-Sébastien Coron, pp. 613-626
 PDF  postscript BibTeX

[ IACR home page ] © IACR