Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project
ASIACRYPT 2002: Queenstown, New Zealand
Yuliang Zheng (Ed.): Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Lecture Notes in Computer Science 2501 Springer 2002, ISBN 3-540-00171-9 BibTeX
PREFACE by Yuliang Zheng
Sponsored by the
International Association for Cryptologic Research (IACR)
General Chair
Henry Wolfe, University of Otago, New Zealand
Program Chair
Yuliang Zheng, University of North Carolina at Charlotte, USA
Program Committee
Feng Bao | LIT, Singapore |
Ed Dawson | QUT, Australia |
Giovanni DiCrescenzo | Telcordia, USA |
Matthew Franklin | UC Davis, USA |
Dieter Gollmann | Microsoft Research, UK |
Helena Handschuh | Gemplus, France |
Philip Hawkes | Qualcomm, Australia |
Ari Juels | RSA Laboratories, USA |
Kwangjo Kim | ICU, Korea |
Seungjoo Kim | KISA, Korea |
Chi Sung Laih | National Cheng Kung University, Taiwan |
Pil Joong Lee | POSTECH, Korea |
Arjen Lenstra | Citibank, USA |
Phil MacKenzie | Lucent Technologies, USA |
Masahiro Mambo | Tohoku University, Japan |
Wenbo Mao | HP Labs, UK |
Keith Martin | Royal Holloway University of London, UK |
Alfred Menezes | University of Waterloo, Canada |
Phong Nguyen | ENS, France |
Dingyi Pei | Chinese Academy of Sciences, China |
Bart Preneel | Katholieke Universiteit Leuven, Belgium |
Kouichi Sakurai | Kyushu University, Japan |
Jessica Staddon | PARC, USA |
Serge Vaudenay | EPFL, Switzerland |
Sung-Ming Yen | National Central University, Taiwan |
Xian-Mo Zhang | University of Wollongong, Australia |
Yuliang Zheng (Chair) | UNC Charlotte, USA |
Hong Zhu | Fudan University, China |
TABLE of CONTENTS
-
Arjen K. Lenstra
,
Adi Shamir
,
Jim Tomlinson
,
Eran Tromer
:
Analysis of Bernstein's Factorization Circuit. (.ps) 1-26
BibTeX -
Stefan Lucks
:
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. (.ps) 27-45
BibTeX -
Wieb Bosma
,
James Hutton
,
Eric R. Verheul
:
Looking beyond XTR. (.ps) 46-63
BibTeX -
Wakaha Ogata
,
Kaoru Kurosawa
:
Bounds for Robust Metering Schemes and Their Relationship with A-code. (.ps) 64-80
BibTeX -
Goichiro Hanaoka
,
Junji Shikata
,
Yumiko Hanaoka
,
Hideki Imai
:
Unconditionally Secure Anonymous Encryption and Group Authentication. (.ps) 81-99
BibTeX -
Alexander W. Dent
:
Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. (.ps) 100-109
BibTeX -
Yan-Cheng Chang
,
Chun-Yun Hsiao
,
Chi-Jen Lu
:
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives. (.ps) 110-124
BibTeX -
Ivan Damgård
,
Eiichiro Fujisaki
:
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. (.ps) 125-142
BibTeX -
Dowon Hong
,
Ku-Young Chang
,
Heuisu Ryu
:
Efficient Oblivious Transfer in the Bounded-Storage Model. (.ps) 143-159
BibTeX -
Elad Barkan
,
Eli Biham
:
In How Many Ways Can You Write Rijndael? (.ps) 160-175
BibTeX -
Sangwoo Park
,
Soo Hak Sung
,
Seongtaek Chee
,
E-Joong Yoon
,
Jongin Lim
:
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. (.ps) 176-191
BibTeX -
Jonathan Katz
,
Moti Yung
:
Threshold Cryptosystems Based on Factoring. (.ps) 192-205
BibTeX -
Masayuki Abe
,
Ronald Cramer
,
Serge Fehr
:
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. (.ps) 206-223
BibTeX -
K. Srinathan
,
M. V. N. Ashwin Kumar
,
C. Pandu Rangan
:
Asynchronous Secure Communication Tolerating Mixed Adversaries. (.ps) 224-242
BibTeX -
Jongsung Kim
,
Dukjae Moon
,
Wonil Lee
,
Seokhie Hong
,
Sangjin Lee
,
Seokwon Jung
:
Amplified Boomerang Attack against Reduced-Round SHACAL. (.ps) 243-253
BibTeX -
Eli Biham
,
Orr Dunkelman
,
Nathan Keller
:
Enhancing Differential-Linear Cryptanalysis. (.ps) 254-266
BibTeX -
Nicolas Courtois
,
Josef Pieprzyk
:
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. (.ps) 267-287
BibTeX -
Alexander Klimov
,
Anton Mityagin
,
Adi Shamir
:
Analysis of Neural Cryptography. (.ps) 288-298
BibTeX -
Dario Catalano
,
Phong Q. Nguyen
,
Jacques Stern
:
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. (.ps) 299-310
BibTeX -
Pierrick Gaudry
:
A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2. (.ps) 311-327
BibTeX -
Hiroki Koga
:
A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme. (.ps) 328-345
BibTeX -
Paolo D'Arco
,
Douglas R. Stinson
:
On Unconditionally Secure Robust Distributed Key Distribution Centers. (.ps) 346-363
BibTeX -
Louis Granboulan
:
Short Signatures in the Random Oracle Model. (.ps) 364-378
BibTeX -
Alejandro Hevia
,
Daniele Micciancio
:
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes. (.ps) 379-396
BibTeX -
Mihir Bellare
,
Gregory Neven
:
Transitive Signatures Based on Factoring and RSA. (.ps) 397-414
BibTeX -
Masayuki Abe
,
Miyako Ohkubo
,
Koutarou Suzuki
:
1-out-of-n Signatures from a Variety of Keys. (.ps) 415-432
BibTeX -
Tomoyuki Asano
:
A Revocation Scheme with Minimal Storage at Receivers. (.ps) 433-450
BibTeX -
Philippe Golle
,
Sheng Zhong
,
Dan Boneh
,
Markus Jakobsson
,
Ari Juels
:
Optimistic Mixing for Exit-Polls. (.ps) 451-465
BibTeX -
Kishan Chand Gupta
,
Palash Sarkar
:
Improved Construction of Nonlinear Resilient S-Boxes. (.ps) 466-483
BibTeX -
Claude Carlet
,
Aline Gouget
:
An Upper Bound on the Number of m-Resilient Boolean Functions. (.ps) 484-496
BibTeX -
Emmanuel Bresson
,
Olivier Chevassut
,
David Pointcheval
:
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. (.ps) 497-514
BibTeX -
Chanathip Namprempre
:
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. (.ps) 515-532
BibTeX -
Fangguo Zhang
,
Kwangjo Kim
:
ID-Based Blind Signature and Ring Signature from Pairings. (.ps) 533-547
BibTeX -
Craig Gentry
,
Alice Silverberg
:
Hierarchical ID-Based Cryptography. (.ps) 548-566
BibTeX -
Moti Yung
:
Crypto-integrity. (.ps) 567-573
BibTeX -
Tsutomu Matsumoto
:
Gummy and Conductive Silicone Rubber Fingers. (.ps) 574-576
BibTeX