IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of EUROCRYPT 2002

Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings , Springer
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups., Rosario Gennaro, Daniele Micciancio, pp. 1-13
 PDF  postscript BibTeX
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups., Sangjin Lee, Eonkyung Lee, pp. 14-28
 PDF  postscript BibTeX
Extending the GHS Weil Descent Attack., Steven D. Galbraith, Florian Hess, Nigel P. Smart, pp. 29-44
 PDF  postscript BibTeX
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption., Ronald Cramer, Victor Shoup, pp. 45-64
 PDF  postscript BibTeX
Key-Insulated Public Key Cryptosystems., Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung, pp. 65-82
 PDF  postscript BibTeX
On the Security of Joint Signature and Encryption., Jee Hea An, Yevgeniy Dodis, Tal Rabin, pp. 83-107
 PDF  postscript BibTeX
AES and the Wide Trail Design Strategy., Joan Daemen, Vincent Rijmen, pp. 108-109
 PDF  postscript BibTeX
Indistinguishability of Random Systems., Ueli M. Maurer, pp. 110-132
 PDF  postscript BibTeX
How to Fool an Unbounded Adversary with a Short Key., Alexander Russell, Hong Wang 0002, pp. 133-148
 PDF  postscript BibTeX
Cryptography in an Unbounded Computational Model., David P. Woodruff, Marten van Dijk, pp. 149-164
 PDF  postscript BibTeX
Performance Analysis and Parallel Implementation of Dedicated Hash Functions., Junko Nakajima, Mitsuru Matsui, pp. 165-180
 PDF  postscript BibTeX
Fault Injection and a Timing Channel on an Analysis Technique., John A. Clark, Jeremy L. Jacob, pp. 181-196
 PDF  postscript BibTeX
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms., Young-Ho Park, Sangtae Jeong, Jongin Lim, pp. 197-208
 PDF  postscript BibTeX
Fast Correlation Attacks: An Algorithmic Point of View., Philippe Chose, Antoine Joux, Michel Mitton, pp. 209-221
 PDF  postscript BibTeX
BDD-Based Cryptanalysis of Keystream Generators., Matthias Krause, pp. 222-237
 PDF  postscript BibTeX
Linear Cryptanalysis of Bluetooth Stream Cipher., Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari, pp. 238-255
 PDF  postscript BibTeX
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups., Ivan Damgård, Maciej Koprowski, pp. 256-271
 PDF  postscript BibTeX
Optimal Security Proofs for PSS and Other Signature Schemes., Jean-Sébastien Coron, pp. 272-287
 PDF  postscript BibTeX
Cryptanalysis of SFLASH., Henri Gilbert, Marine Minier, pp. 288-298
 PDF  postscript BibTeX
Cryptanalysis of the Revised NTRU Signature Scheme., Craig Gentry, Michael Szydlo, pp. 299-320
 PDF  postscript BibTeX
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions., Emmanuel Bresson, Olivier Chevassut, David Pointcheval, pp. 321-336
 PDF  postscript BibTeX
Universally Composable Notions of Key Exchange and Secure Channels., Ran Canetti, Hugo Krawczyk, pp. 337-351
 postscript BibTeX
On Deniability in Quantum Key Exchange., Donald Beaver, pp. 352-367
 PDF  postscript BibTeX
A Practice-Oriented Treatment of Pseudorandom Number Generators., Anand Desai, Alejandro Hevia, Yiqun Lisa Yin, pp. 368-383
 PDF  postscript BibTeX
A Block-Cipher Mode of Operation for Parallelizable Message Authentication., John Black, Phillip Rogaway, pp. 384-397
 PDF  postscript BibTeX
Rethinking PKI: What's Trust Got to Do with It?, Stephen T. Kent, pp. 398-399
 PDF  postscript BibTeX
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods., Tal Malkin, Daniele Micciancio, Sara K. Miner, pp. 400-417
 PDF  postscript BibTeX
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security., Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre, pp. 418-433
 PDF  postscript BibTeX
Security Notions for Unconditionally Secure Signature Schemes., Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai, pp. 434-449
 PDF  postscript BibTeX
Traitor Tracing with Constant Transmission Rate., Aggelos Kiayias, Moti Yung, pp. 450-465
 PDF  postscript BibTeX
Toward Hierarchical Identity-Based Encryption., Jeremy Horwitz, Ben Lynn, pp. 466-481
 PDF  postscript BibTeX
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch., Matthias Fitzi, Nicolas Gisin, Ueli M. Maurer, Oliver von Rotz, pp. 482-501
 PDF  postscript BibTeX
Perfectly Secure Message Transmission Revisited., Yvo Desmedt, Yongge Wang, pp. 502-517
 PDF  postscript BibTeX
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis., Anne Canteaut, Marion Videau, pp. 518-533
 PDF  postscript BibTeX
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS ...., Serge Vaudenay, pp. 534-546
 PDF  postscript BibTeX

[ IACR home page ] © IACR