CRYPTO 2001:
Santa Barbara,
California,
USA
Information on this web page was provided courtesy of Michael Ley and the
DBLP Project
Joe Kilian
(Ed.):
Advances in Cryptology - CRYPTO 2001,
21st Annual International
Cryptology Conference,
Santa Barbara, California, USA,
August 19-23, 2001
Proceedings, Lecture Notes in Computer Science 2139 Springer 2001, ISBN 3-540-42456-3 BibTeX
PREFACE
Sponsored by the
International Association for Cryptologic Research (IACR)
in cooperation with
IEEE Computer Society Technical Committee on Security and Privacy,
Computer Science Department, University of California, Santa Barbara
General Chair
David Balenson, NAI Labs, Network Associates, Inc., USA
Program Chair
Joe Kilian, Yianilos Labs, USA
Program Committee
- Bill Aiello, AT&T Research, USA
- Don Beaver, CertCo, USA
- Josh Benaloh, Microsoft Research, USA
- Antoon Bosselaers, Katholieke Universiteit Leuven, Belgium
- Jan Camenisch, IBM Zurich, Switzerland
- Ran Canetti, IBM T. J. Watson, USA
- Claude Crépeau, McGill University, Canada
- Alfredo De Santis, Università di Salerno, Italy
- Marc Girault, France Telecom, France
- Stuart Haber, InterTrust STAR Lab, USA
- Tatsuaki Okamoto, NTT Labs, Japan
- Jacques Patarin, BULL, France
- Erez Petrank, Technion, Israel
- Omer Reingold, AT&T Research, USA
- Kazue Sako, NEC C&C Media Research Lab, Japan
- Tomas Sander, InterTrust STAR Lab, USA
- Doug Stinson, University of Waterloo, Canada
- Yacov Yacobi, Microsoft Research, USA
Advisory Members
Mihir Bellare (Crypto 2000 program chair), UCSD, USA
Moti Yung (Crypto 2002 program chair) CertCo, USA
@proceedings{DBLP:conf/crypto/2001,
editor = {Joe Kilian},
title = {Advances in Cryptology - CRYPTO 2001, 21st Annual International
Cryptology Conference, Santa Barbara, California, USA, August
19-23, 2001, Proceedings},
booktitle = {CRYPTO},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2139},
year = {2001},
isbn = {3-540-42456-3},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Table of Contents
Foundations
Traitor Tracing
Multi-party Computation
Two-Party Computation
Elliptic Curves
OAEP
Encryption and Authentication
Signature Schemes
Protocols
Cryptoanalysis
Application of Groups and Codes
Broadcast and Secret Sharling
Soundness and Zero-Knowledge