Proceedings of EUROCRYPT 2002
Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings
, Springer
- Cryptanalysis of a Pseudorandom Generator Based on Braid Groups., Rosario Gennaro, Daniele Micciancio, pp. 1-13
- PDF postscript BibTeX
- Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups., Sangjin Lee, Eonkyung Lee, pp. 14-28
- PDF postscript BibTeX
- Extending the GHS Weil Descent Attack., Steven D. Galbraith, Florian Hess, Nigel P. Smart, pp. 29-44
- PDF postscript BibTeX
- Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption., Ronald Cramer, Victor Shoup, pp. 45-64
- PDF postscript BibTeX
- Key-Insulated Public Key Cryptosystems., Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung, pp. 65-82
- PDF postscript BibTeX
- On the Security of Joint Signature and Encryption., Jee Hea An, Yevgeniy Dodis, Tal Rabin, pp. 83-107
- PDF postscript BibTeX
- AES and the Wide Trail Design Strategy., Joan Daemen, Vincent Rijmen, pp. 108-109
- PDF postscript BibTeX
- Indistinguishability of Random Systems., Ueli M. Maurer, pp. 110-132
- PDF postscript BibTeX
- How to Fool an Unbounded Adversary with a Short Key., Alexander Russell, Hong Wang 0002, pp. 133-148
- PDF postscript BibTeX
- Cryptography in an Unbounded Computational Model., David P. Woodruff, Marten van Dijk, pp. 149-164
- PDF postscript BibTeX
- Performance Analysis and Parallel Implementation of Dedicated Hash Functions., Junko Nakajima, Mitsuru Matsui, pp. 165-180
- PDF postscript BibTeX
- Fault Injection and a Timing Channel on an Analysis Technique., John A. Clark, Jeremy L. Jacob, pp. 181-196
- PDF postscript BibTeX
- Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms., Young-Ho Park, Sangtae Jeong, Jongin Lim, pp. 197-208
- PDF postscript BibTeX
- Fast Correlation Attacks: An Algorithmic Point of View., Philippe Chose, Antoine Joux, Michel Mitton, pp. 209-221
- PDF postscript BibTeX
- BDD-Based Cryptanalysis of Keystream Generators., Matthias Krause, pp. 222-237
- PDF postscript BibTeX
- Linear Cryptanalysis of Bluetooth Stream Cipher., Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari, pp. 238-255
- PDF postscript BibTeX
- Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups., Ivan Damgård, Maciej Koprowski, pp. 256-271
- PDF postscript BibTeX
- Optimal Security Proofs for PSS and Other Signature Schemes., Jean-Sébastien Coron, pp. 272-287
- PDF postscript BibTeX
- Cryptanalysis of SFLASH., Henri Gilbert, Marine Minier, pp. 288-298
- PDF postscript BibTeX
- Cryptanalysis of the Revised NTRU Signature Scheme., Craig Gentry, Michael Szydlo, pp. 299-320
- PDF postscript BibTeX
- Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions., Emmanuel Bresson, Olivier Chevassut, David Pointcheval, pp. 321-336
- PDF postscript BibTeX
- Universally Composable Notions of Key Exchange and Secure Channels., Ran Canetti, Hugo Krawczyk, pp. 337-351
- postscript BibTeX
- On Deniability in Quantum Key Exchange., Donald Beaver, pp. 352-367
- PDF postscript BibTeX
- A Practice-Oriented Treatment of Pseudorandom Number Generators., Anand Desai, Alejandro Hevia, Yiqun Lisa Yin, pp. 368-383
- PDF postscript BibTeX
- A Block-Cipher Mode of Operation for Parallelizable Message Authentication., John Black, Phillip Rogaway, pp. 384-397
- PDF postscript BibTeX
- Rethinking PKI: What's Trust Got to Do with It?, Stephen T. Kent, pp. 398-399
- PDF postscript BibTeX
- Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods., Tal Malkin, Daniele Micciancio, Sara K. Miner, pp. 400-417
- PDF postscript BibTeX
- From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security., Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre, pp. 418-433
- PDF postscript BibTeX
- Security Notions for Unconditionally Secure Signature Schemes., Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai, pp. 434-449
- PDF postscript BibTeX
- Traitor Tracing with Constant Transmission Rate., Aggelos Kiayias, Moti Yung, pp. 450-465
- PDF postscript BibTeX
- Toward Hierarchical Identity-Based Encryption., Jeremy Horwitz, Ben Lynn, pp. 466-481
- PDF postscript BibTeX
- Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch., Matthias Fitzi, Nicolas Gisin, Ueli M. Maurer, Oliver von Rotz, pp. 482-501
- PDF postscript BibTeX
- Perfectly Secure Message Transmission Revisited., Yvo Desmedt, Yongge Wang, pp. 502-517
- PDF postscript BibTeX
- Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis., Anne Canteaut, Marion Videau, pp. 518-533
- PDF postscript BibTeX
- Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS ...., Serge Vaudenay, pp. 534-546
- PDF postscript BibTeX
[ IACR home page ]
© IACR