ASIACRYPT2001:
Gold Coast, AustraliaInformation on this web page was provided courtesy of Michael Ley and the DBLP Project
Colin Boyd (Ed.):
Advances in Cryptology - ASIACRYPT 2001,
7th International Conference on the Theory and Application of Cryptology and Information Security,
Gold Coast, Australia,
December 9-13, 2001,
Proceedings. Lecture Notes in Computer Science 2248 Springer 2001, ISBN 3-540-42987-5 BibTeX
International Association for Cryptologic Research (IACR)
General Chair
Ed Dawson, Queensland University of Technology, Australia
Program Chair
Colin Boyd, Queensland University of Technology, Australia
PREFACE
Program Committee
Masayuki Abe | NTT Laboratories, Japan |
Ronald Cramer | BRICS & University of Aarhus, Denmark |
ZongDuo Dai | Univ. of Science and Technology of China |
Rosario Gennaro | IBM TJ Watson Research Centre, USA |
Jovan Goliç | Gemplus, Italy |
Chi-Sung Laih | National Cheng Kung Univ., Taiwan |
Kwok Yan Lam | PrivyLink International Ltd, Singapore |
Pil Joong Lee | POSTECH, Korea |
Arjen K Lenstra | Citibank, USA; TU Eindhoven, Netherlands |
Wenbo Mao | HP Laboratories, UK |
Pascal Paillier | Gemplus, France |
Vincent Rijmen | Cryptomathic, Belgium |
Bimal Roy | Indian Statistical Institute |
Rei Safavi-Naini | University of Wollongong, Australia |
Kouichi Sakurai | Kyushu University, Japan |
Nigel Smart | University of Bristol, UK |
Stefan Wolf | University of Waterloo, Canada |
Moti Yung | CertCo, USA |
Yuliang Zheng | Monash University, Australia |
Tatsuaki Okamoto (Asiacrypt 2000 Program Chair), NTT Laboratories, Japan
Table of Contents
Lattice Based Cryptography
-
Craig Gentry
,
Jakob Jonsson
,
Jacques Stern
,
Michael Szydlo
:
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. 1-20
BibTeX -
Phong Q. Nguyen
,
Igor Shparlinski
:
On the Insecurity of a Server-Aided RSA Protocol. 21-35
BibTeX -
Dan Boneh
,
Shai Halevi
,
Nick Howgrave-Graham
:
The Modular Inversion Hidden Number Problem. 36-51
BibTeX
Human Identification
Invited Talk
-
Arjen K. Lenstra
:
Unbelievable Security. Matching AES Security Using Public Key Systems. 67-86
BibTeX
Practical Public Key Cryptography
-
Siguna Müller
:
A Probable Prime Test with Very High Confidence for n equiv 1 mod 4. 87-106
BibTeX -
Emmanuel Thomé
:
Computation of Discrete Logarithms in F 2 607 . 107-124
BibTeX -
Martijn Stam
,
Arjen K. Lenstra
:
Speeding Up XTR. 125-143
BibTeX -
Jae Choon Cha
,
Ki Hyoung Ko
,
Sangjin Lee
,
Jae Woo Han
,
Jung Hee Cheon
:
An Efficient Implementation of Braid Groups. 144-156
BibTeX
Cryptography Based on Coding Theory
-
Nicolas Courtois
,
Matthieu Finiasz
,
Nicolas Sendrier
:
How to Achieve a McEliece-Based Digital Signature Scheme. 157-174
BibTeX -
Alice Silverberg
,
Jessica Staddon
,
Judy L. Walker
:
Efficient Traitor Tracing Algorithms Using List Decoding. 175-192
BibTeX
Block Ciphers
-
Makoto Sugita
,
Kazukuni Kobara
,
Hideki Imai
:
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. 193-207
BibTeX -
Deukjo Hong
,
Jaechul Sung
,
Seokhie Hong
,
Wonil Lee
,
Sangjin Lee
,
Jongin Lim
,
Okyeon Yi
:
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. 208-221
BibTeX -
Jacques Patarin
:
Generic Attacks on Feistel Schemes. 222-238
BibTeX -
Akashi Satoh
,
Sumio Morioka
,
Kohji Takano
,
Seiji Munetoh
:
A Compact Rijndael Hardware Architecture with S-Box Optimization. 239-254
BibTeX
Provable Security
-
Ju-Sung Kang
,
Sang Uk Shin
,
Dowon Hong
,
Okyeon Yi
:
Provable Security of KASUMI and 3GPP Encryption Mode f8. 255-271
BibTeX -
Duncan S. Wong
,
Agnes Hui Chan
:
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. 272-289
BibTeX -
Emmanuel Bresson
,
Olivier Chevassut
,
David Pointcheval
:
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. 290-309
BibTeX
Threshold Cryptography
-
Pierre-Alain Fouque
,
Jacques Stern
:
Fully Distributed Threshold RSA under Standard Assumptions. 310-330
BibTeX -
Anna Lysyanskaya
,
Chris Peikert
:
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. 331-350
BibTeX -
Pierre-Alain Fouque
,
David Pointcheval
:
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. 351-368
BibTeX
Two-Party Protocols
-
Yan-Cheng Chang
,
Chi-Jen Lu
:
Oblivious Polynomial Evaluation and Oblivious Neural Learning. 369-384
BibTeX -
Moses Liskov
,
Anna Lysyanskaya
,
Silvio Micali
,
Leonid Reyzin
,
Adam Smith
:
Mutually Independent Commitments. 385-401
BibTeX
Zero Knowledge
-
Nicolas Courtois
:
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. 402-421
BibTeX -
Tzafrir Cohen
,
Joe Kilian
,
Erez Petrank
:
Responsive Round Complexity and Concurrent Zero-Knowledge. 422-441
BibTeX
Cryptographic Building Blocks
-
Johan Håstad
,
Mats Näslund
:
Practical Construction and Analysis of Pseudo-Randomness Primitives. 442-459
BibTeX -
Yuriy Tarannikov
,
Peter Korolev
,
Anton Botev
:
Autocorrelation Coefficients and Correlation Immunity of Boolean Functions. 460-479
BibTeX
Elliptic Curve Cryptography
-
Pierrick Gaudry
,
Nicolas Gürel
:
An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves. 480-494
BibTeX -
Steven D. Galbraith
:
Supersingular Curves in Cryptography. 495-513
BibTeX -
Dan Boneh
,
Ben Lynn
,
Hovav Shacham
:
Short Signatures from the Weil Pairing. 514-532
BibTeX -
Eric R. Verheul
:
Self-Blindable Credential Certificates from the Weil Pairing. 533-551
BibTeX
Anonymity
-
Ronald L. Rivest
,
Adi Shamir
,
Yael Tauman
:
How to Leak a Secret. 552-565
BibTeX -
Mihir Bellare
,
Alexandra Boldyreva
,
Anand Desai
,
David Pointcheval
:
Key-Privacy in Public-Key Encryption. 566-582
BibTeX -
Masayuki Abe
,
Miyako Ohkubo
:
Provably Secure Fair Blind Signatures with Tight Revocation. 583-602
BibTeX