Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of crypto 2002
Preface and frontmatter
Page
Title
1-16
Essential Algebraic Structure within the AES
17-30
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC
31-46
Tweakable Block Ciphers
47-60
The LSD Broadcast Encryption Scheme
61-76
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
77-92
Provably Secure Steganography
93-110
Flaws in Applying Proof Methodologies to Signature Schemes
111-126
Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case
127-142
On the Security of RSA Encryption in TLS
143-161
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
162-177
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
178-193
On 2-Round Secure Multiparty Computation
194-209
Private Computation - k-Connected versus 1-Connected Networks
210-225
Analysis and Improvements of NTRU Encryption Paddings
226-241
Universal Padding Schemes for RSA
242-256
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent
257-271
Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors
272-287
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
288-303
A Generalized Birthday Problem
304-319
(Not So) Random Shuffles of RC4
320-335
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
336-353
Supersingular Abelian Varieties in Cryptology
354-368
Efficient Algorithms for Pairing-Based Cryptosystems
369-384
Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2
385-400
Threshold Password-Authenticated Key Exchange
401-416
A Threshold Pseudorandom Function Construction and Its Applications
417-432
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
433-448
Hidden Number Problem with the Trace and Bit Security of XTR and LUC
449-464
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security
465-480
Threshold Ring Signatures and Applications to Ad-hoc Groups
481-498
Deniable Ring Authentication
499-514
SiBIR: Signer-Base Intrusion-Resilient Signatures
515-532
Cryptanalysis of Stream Ciphers with Linear Masking
533-548
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
549-564
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction
565-580
Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks
581-596
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
597-612
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
613-626
Security Proof for Partial-Domain Hash Signature Schemes