CRYPTO 2002: Santa Barbara, California, USA

August 18-22, 2002, Santa Barbara, California, USA
Moti Yung (Ed.): Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings.
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project
Lecture Notes in Computer Science 2442 Springer 2002, ISBN 3-540-44050-X BibTeX

PREFACE by the Program Chair

Sponsored by the International Association for Cryptologic Research (IACR)
in cooperation with
IEEE Computer Society Technical Committee on Security and Privacy,
and the Computer Science Department, University of California, Santa Barbara

General Chair
Rebecca N. Wright, Stevens Institute of Technology, NJ, USA

Program Chair
Moti Yung, Columbia University, NY, USA

Program Commitee

Tom Berson Anagram Laboratories, USA
Don Coppersmith IBM Research, USA
Giovanni Di Crescenzo Telcordia, USA
Hans Dobbertin University of Bochum, Germany
Matt Franklin UC Davis, USA
Juan Garay Bell Labs, USA
Stuart Haber Surety, Inc. , USA
Johan H{\aa}stad Royal Institute of Technology, Sweden
Kwangjo Kim ICU, Korea
Alfred Menezes University of Waterloo, Canada
David Naccache Gemplus, France
Tatsuaki Okamoto NTT Labs, Japan
Rafail Ostrovsky Telcordia, USA
Erez Petrank Technion, Israel
Bart Preneel K. U. Leuven, Belgium
Ron Rivest Massachusetts Institute of Technology, USA
Rei Safavi-Naini University of Wollongong, Australia
Dan Simon Microsoft Research, USA
Nigel Smart University of Bristol, England
Markus Stadler Crypto AG, Switzerland
Eric Verheul PricewaterhouseCoopers, the Netherlands
Yiqun Lisa Yin NTT MCL, USA
External reviewers

Advisory Members

Joe Kilian (Crypto 2001, Program Chair) NEC, USA
Dan Boneh (Crypto 2003, Program Chair) Stanford University, USA

Block Ciphers

Multi-user Oriented Cryptosystems

Foundations and Methodology

Security of Practical Protocols

Secure Multiparty Computation

Public-Key Encryption

Information Theory and Secret Sharing

Cipher Design and Analysis

Elliptic Curves and Abelian Varieties

Password-Based Authentication

Distributed Cryptosystems

Pseudorandomness and Applications

Variations on Signatures and Authentication

Stream Ciphers and Boolean Functions

Commitment Schemes

Signature Schemes