Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2002. Proceedings. (English) Zbl 0997.00039
Lecture Notes in Computer Science. 2442. Berlin: Springer. xiv, 627 p. (2002).
Show indexed articles as search result.
The articles of mathematical interest will be reviewed individually. The preceding conference (21st, 2001) has been reviewed (see Zbl 0969.00102).Indexed articles:
Murphy, Sean; Robshaw, Matthew J. B., Essential algebraic structure within the AES, 1-16 [Zbl 1026.94537]
Joux, Antoine; Martinet, Gwenaëlle; Valette, Frédéric, Blockwise-adaptive attackers. Revisiting the (in)security of some provably secure encryption modes: CBC, GEM, IACBC, 17-30 [Zbl 1026.94531]
Liskov, Moses; Rivest, Ronald L.; Wagner, David, Tweakable block ciphers, 31-46 [Zbl 1026.94533]
Halevy, Dani; Shamir, Adi, The LSD broadcast encryption scheme, 47-60 [Zbl 1026.94528]
Camenisch, Jan; Lysyanskaya, Anna, Dynamic accumulators and application to efficient revocation of anonymous credentials, 61-76 [Zbl 1026.94545]
Hopper, Nicholas J.; Langford, John; von Ahn, Luis, Provably secure steganography, 77-92 [Zbl 1026.94529]
Stern, Jacques; Pointcheval, David; Malone-Lee, John; Smart, Nigel P., Flaws in applying proof methodologies to signature schemes, 93-110 [Zbl 1026.94550]
Nielsen, Jesper Buus, Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case, 111-126 [Zbl 1027.68601]
Jonsson, Jakob; Kaliski, Burton S. jun., On the security of RSA encryption in TLS, 127-142 [Zbl 1026.94530]
Canetti, Ran; Krawczyk, Hugo, Security analysis of IKE’s signature-based key-exchange protocol, 143-161 [Zbl 1026.94524]
Bellare, Mihir; Palacio, Adriana, GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks, 162-177 [Zbl 1026.94521]
Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal, On 2-round secure multiparty computation, 178-193 [Zbl 1026.94527]
Bläser, Markus; Jakoby, Andreas; Liśkiewicz, Maciej; Siebert, Bodo, Private computation – \(k\)-connected versus 1-connected networks, 194-209 [Zbl 1026.94523]
Nguyen, Phong Q.; Pointcheval, David, Analysis and improvements of NTRU encryption paddings, 210-225 [Zbl 1026.94538]
Coron, Jean-Sébastien; Joye, Marc; Naccache, David; Paillier, Pascal, Universal padding schemes for RSA, 226-241 [Zbl 1026.94526]
May, Alexander, Cryptanalysis of unbalanced RSA with small CRT-exponent, 242-256 [Zbl 1026.94535]
Lu, Chi-Jen, Hyper-encryption against space-bounded adversaries from on-line strong extractors, 257-271 [Zbl 1027.68057]
Cramer, Ronald; Fehr, Serge, Optimal black-box secret sharing over arbitrary Abelian groups, 272-287 [Zbl 1026.94546]
Wagner, David, A generalized birthday problem, 288-303 [Zbl 1026.94541]
Mironov, Ilya, (Not so) random shuffles of RC4, 304-319 [Zbl 1027.68058]
Black, John; Rogaway, Phillip; Shrimpton, Thomas, Black-box analysis of the block-cipher-based hash-function constructions from PGV, 320-335 [Zbl 1026.94522]
Rubin, Karl; Silverberg, Alice, Supersingular Abelian varieties in cryptology, 336-353 [Zbl 1026.94540]
Barreto, Paulo S. L. M.; Kim, Hae Y.; Lynn, Ben; Scott, Michael, Efficient algorithms for pairing-based cryptosystems, 354-368 [Zbl 1026.94520]
Vercauteren, Frederik, Computing zeta functions of hyperelliptic curves over finite fields of characteristic 2, 369-384 [Zbl 1023.14007]
MacKenzie, Philip; Shrimpton, Thomas; Jakobsson, Markus, Threshold password-authenticated key exchange, 385-400 [Zbl 1026.94548]
Nielsen, Jesper Buus, A threshold pseudorandom function construction and its applications, 401-416 [Zbl 1026.94539]
Algesheimer, Joy; Camenisch, Jan; Shoup, Victor, Efficient computation modulo a shared secret with application to the generation of shared safe-prime products, 417-432 [Zbl 1026.94543]
Li, Wen-Ching W.; Näslund, Mats; Shparlinski, Igor E., Hidden number problem with the trace and bit security of XTR and LUC, 433-448 [Zbl 1026.94532]
Damgård, Ivan; Nielsen, Jesper Buus, Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security, 449-464 [Zbl 1027.68056]
Bresson, Emmanuel; Stern, Jacques; Szydlo, Michael, Threshold ring signatures and applications to ad-hoc groups, 465-480 [Zbl 1026.94544]
Naor, Moni, Deniable ring authentication, 481-498 [Zbl 1026.94549]
Itkis, Gene; Reyzin, Leonid, SiBIR: Signer-base intrusion-resilient signatures, 499-514 [Zbl 1026.94547]
Coppersmith, Don; Halevi, Shai; Jutla, Charanjit, Cryptanalysis of stream ciphers with linear masking, 515-532 [Zbl 1026.94525]
Sarkar, Palash, The filter-combiner model for memoryless synchronous stream ciphers, 533-548 [Zbl 1026.94519]
Carlet, Claude, A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction, 549-564 [Zbl 1026.94518]
Fehr, Serge; Maurer, Ueli, Linear VSS and distributed commitments based on secret sharing and pairwise checks, 565-580 [Zbl 1028.94509]
Damgård, Ivan; Nielsen, Jesper Buus, Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor, 581-596 [Zbl 1028.94505]
Lysyanskaya, Anna, Unique signatures and verifiable random functions from the DH-DDH separation, 597-612 [Zbl 1028.94511]
Coron, Jean-Sébastien, Security proof for partial-domain hash signature schemes, 613-626 [Zbl 1028.94508]
MSC:
00B25 | Proceedings of conferences of miscellaneous specific interest |
94-06 | Proceedings, conferences, collections, etc. pertaining to information and communication theory |
68-06 | Proceedings, conferences, collections, etc. pertaining to computer science |
94A60 | Cryptography |
94A62 | Authentication, digital signatures and secret sharing |
68P25 | Data encryption (aspects in computer science) |