default search action
22nd CRYPTO 2002: Santa Barbara, California, USA
- Moti Yung:
Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings. Lecture Notes in Computer Science 2442, Springer 2002, ISBN 3-540-44050-X
Block Ciphers
- Sean Murphy, Matthew J. B. Robshaw:
Essential Algebraic Structure within the AES. 1-16 - Antoine Joux, Gwenaëlle Martinet, Frédéric Valette:
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. 17-30 - Moses D. Liskov, Ronald L. Rivest, David A. Wagner:
Tweakable Block Ciphers. 31-46
Multi-user Oriented Cryptosystems
- Dani Halevy, Adi Shamir:
The LSD Broadcast Encryption Scheme. 47-60 - Jan Camenisch, Anna Lysyanskaya:
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. 61-76
Foundations and Methodology
- Nicholas J. Hopper, John Langford, Luis von Ahn:
Provably Secure Steganography. 77-92 - Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart:
Flaws in Applying Proof Methodologies to Signature Schemes. 93-110 - Jesper Buus Nielsen:
Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case. 111-126
Security of Practical Protocols
- Jakob Jonsson, Burton S. Kaliski Jr.:
On the Security of RSA Encryption in TLS. 127-142 - Ran Canetti, Hugo Krawczyk:
Security Analysis of IKE's Signature-Based Key-Exchange Protocol. 143-161 - Mihir Bellare, Adriana Palacio:
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. 162-177
Secure Multiparty Computation
- Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
On 2-Round Secure Multiparty Computation. 178-193 - Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Siebert:
Private Computation - k-Connected versus 1-Connected Networks. 194-209
Public-Key Encryption
- Phong Q. Nguyen, David Pointcheval:
Analysis and Improvements of NTRU Encryption Paddings. 210-225 - Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier:
Universal Padding Schemes for RSA. 226-241 - Alexander May:
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. 242-256
Information Theory and Secret Sharing
- Chi-Jen Lu:
Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors. 257-271 - Ronald Cramer, Serge Fehr:
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. 272-287
Cipher Design and Analysis
- David A. Wagner:
A Generalized Birthday Problem. 288-303 - Ilya Mironov:
(Not So) Random Shuffles of RC4. 304-319 - John Black, Phillip Rogaway, Thomas Shrimpton:
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. 320-335
Elliptic Curves and Abelian Varieties
- Karl Rubin, Alice Silverberg:
Supersingular Abelian Varieties in Cryptology. 336-353 - Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, Michael Scott:
Efficient Algorithms for Pairing-Based Cryptosystems. 354-368 - Frederik Vercauteren:
Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2. 369-384
Password-Based Authentication
- Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson:
Threshold Password-Authenticated Key Exchange. 385-400
Distributed Cryptosystems
- Jesper Buus Nielsen:
A Threshold Pseudorandom Function Construction and Its Applications. 401-416 - Joy Algesheimer, Jan Camenisch, Victor Shoup:
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. 417-432
Pseudorandomness and Applications
- Wen-Ching W. Li, Mats Näslund, Igor E. Shparlinski:
Hidden Number Problem with the Trace and Bit Security of XTR and LUC. 433-448 - Ivan Damgård, Jesper Buus Nielsen:
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. 449-464
Variations on Signatures and Authentication
- Emmanuel Bresson, Jacques Stern, Michael Szydlo:
Threshold Ring Signatures and Applications to Ad-hoc Groups. 465-480 - Moni Naor:
Deniable Ring Authentication. 481-498 - Gene Itkis, Leonid Reyzin:
SiBIR: Signer-Base Intrusion-Resilient Signatures. 499-514
Stream Ciphers and Boolean Functions
- Don Coppersmith, Shai Halevi, Charanjit S. Jutla:
Cryptanalysis of Stream Ciphers with Linear Masking. 515-532 - Palash Sarkar:
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers. 533-548 - Claude Carlet:
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction. 549-564
Commitment Schemes
- Serge Fehr, Ueli M. Maurer:
Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks. 565-580 - Ivan Damgård, Jesper Buus Nielsen:
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. 581-596
Signature Schemes
- Anna Lysyanskaya:
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. 597-612 - Jean-Sébastien Coron:
Security Proof for Partial-Domain Hash Signature Schemes. 613-626
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.