


default search action
EUROCRYPT 2002: Amsterdam, The Netherlands
- Lars R. Knudsen:

Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings. Lecture Notes in Computer Science 2332, Springer 2002, ISBN 3-540-43553-0
Cryptanalysis I
- Rosario Gennaro, Daniele Micciancio

:
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups. 1-13 - Sangjin Lee

, Eonkyung Lee
:
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups. 14-28 - Steven D. Galbraith, Florian Hess, Nigel P. Smart:

Extending the GHS Weil Descent Attack. 29-44
Public-Key Enryption
- Ronald Cramer, Victor Shoup:

Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. 45-64 - Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung:

Key-Insulated Public Key Cryptosystems. 65-82 - Jee Hea An, Yevgeniy Dodis, Tal Rabin:

On the Security of Joint Signature and Encryption. 83-107
Invited Talk
- Joan Daemen, Vincent Rijmen:

AES and the Wide Trail Design Strategy. 108-109
Information Theory & New Models
- Ueli M. Maurer:

Indistinguishability of Random Systems. 110-132 - Alexander Russell

, Hong Wang:
How to Fool an Unbounded Adversary with a Short Key. 133-148 - David P. Woodruff, Marten van Dijk

:
Cryptography in an Unbounded Computational Model. 149-164
Implementational Analysis
- Junko Nakajima, Mitsuru Matsui:

Performance Analysis and Parallel Implementation of Dedicated Hash Functions. 165-180 - John A. Clark, Jeremy L. Jacob:

Fault Injection and a Timing Channel on an Analysis Technique. 181-196 - Young-Ho Park, Sangtae Jeong, Jongin Lim:

Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms. 197-208
Stream Ciphers
- Philippe Chose, Antoine Joux, Michel Mitton:

Fast Correlation Attacks: An Algorithmic Point of View. 209-221 - Matthias Krause:

BDD-Based Cryptanalysis of Keystream Generators. 222-237 - Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari

:
Linear Cryptanalysis of Bluetooth Stream Cipher. 238-255
Digital Signatures I
- Ivan Damgård, Maciej Koprowski:

Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups. 256-271 - Jean-Sébastien Coron:

Optimal Security Proofs for PSS and Other Signature Schemes. 272-287
Cryptanalysis II
- Henri Gilbert, Marine Minier:

Cryptanalysis of SFLASH. 288-298 - Craig Gentry, Michael Szydlo:

Cryptanalysis of the Revised NTRU Signature Scheme. 299-320
Key Exchange
- Emmanuel Bresson, Olivier Chevassut, David Pointcheval

:
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. 321-336 - Ran Canetti, Hugo Krawczyk:

Universally Composable Notions of Key Exchange and Secure Channels. 337-351 - Donald Beaver:

On Deniability in Quantum Key Exchange. 352-367
Modes of Operation
- Anand Desai, Alejandro Hevia

, Yiqun Lisa Yin:
A Practice-Oriented Treatment of Pseudorandom Number Generators. 368-383 - John Black, Phillip Rogaway:

A Block-Cipher Mode of Operation for Parallelizable Message Authentication. 384-397
Invited Talk
- Stephen T. Kent:

Rethinking PKI: What's Trust Got to Do with It? 398-399
Digital Signatures II
- Tal Malkin, Daniele Micciancio

, Sara K. Miner:
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods. 400-417 - Michel Abdalla

, Jee Hea An, Mihir Bellare, Chanathip Namprempre:
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. 418-433 - Junji Shikata, Goichiro Hanaoka, Yuliang Zheng

, Hideki Imai:
Security Notions for Unconditionally Secure Signature Schemes. 434-449
Traitor Tracing & Id-Based Encryption
- Aggelos Kiayias, Moti Yung:

Traitor Tracing with Constant Transmission Rate. 450-465 - Jeremy Horwitz, Ben Lynn:

Toward Hierarchical Identity-Based Encryption. 466-481
Multiparty and Multicast
- Matthias Fitzi, Nicolas Gisin, Ueli M. Maurer, Oliver von Rotz:

Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch. 482-501 - Yvo Desmedt, Yongge Wang

:
Perfectly Secure Message Transmission Revisited. 502-517
Symmetric Cryptology
- Anne Canteaut, Marion Videau:

Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. 518-533 - Serge Vaudenay:

Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... 534-546

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














