Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eurocrypt 2002
Preface and frontmatter
Page
Title
1-13
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups
14-28
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups
29-44
Extending the GHS Weil Descent Attack
45-64
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
65-82
Key-Insulated Public Key Cryptosystems
83-107
On the Security of Joint Signature and Encryption
108-109
AES and the Wide Trail Design Strategy
110-132
Indistinguishability of Random Systems
133-148
How to Fool an Unbounded Adversary with a Short Key
149-164
Cryptography in an Unbounded Computational Model
165-180
Performance Analysis and Parallel Implementation of Dedicated Hash Functions
181-196
Fault Injection and a Timing Channel on an Analysis Technique
197-208
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms
209-221
Fast Correlation Attacks: An Algorithmic Point of View
222-237
BDD-Based Cryptanalysis of Keystream Generators
238-255
Linear Cryptanalysis of Bluetooth Stream Cipher
256-271
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups
272-287
Optimal Security Proofs for PSS and Other Signature Schemes
288-298
Cryptanalysis of SFLASH
299-320
Cryptanalysis of the Revised NTRU Signature Scheme
321-336
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
337-351
Universally Composable Notions of Key Exchange and Secure Channels
352-367
On Deniability in Quantum Key Exchange
368-383
A Practice-Oriented Treatment of Pseudorandom Number Generators
384-397
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
398-399
Rethinking PKI: What's Trust Got to Do with It?
400-417
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods
418-433
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
434-449
Security Notions for Unconditionally Secure Signature Schemes
450-465
Traitor Tracing with Constant Transmission Rate
466-481
Toward Hierarchical Identity-Based Encryption
482-501
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch
502-517
Perfectly Secure Message Transmission Revisited
518-533
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis
534-546
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS