CRYPTO 2002: Santa Barbara, California, USA
August 18-22, 2002, Santa Barbara, California, USAMoti Yung (Ed.): Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings.
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project
Lecture Notes in Computer Science 2442 Springer 2002, ISBN 3-540-44050-X BibTeX
PREFACE by the Program Chair
Sponsored by the International Association for Cryptologic Research (IACR)
in cooperation with
IEEE Computer Society Technical Committee on Security and
Privacy,
and the Computer Science Department, University of California, Santa Barbara
General Chair
Rebecca N. Wright, Stevens Institute of Technology, NJ, USA
Program Chair
Moti Yung, Columbia University, NY, USA
Program Commitee
Tom Berson | Anagram Laboratories, USA |
Don Coppersmith | IBM Research, USA |
Giovanni Di Crescenzo | Telcordia, USA |
Hans Dobbertin | University of Bochum, Germany |
Matt Franklin | UC Davis, USA |
Juan Garay | Bell Labs, USA |
Stuart Haber | Surety, Inc. , USA |
Johan H{\aa}stad | Royal Institute of Technology, Sweden |
Kwangjo Kim | ICU, Korea |
Alfred Menezes | University of Waterloo, Canada |
David Naccache | Gemplus, France |
Tatsuaki Okamoto | NTT Labs, Japan |
Rafail Ostrovsky | Telcordia, USA |
Erez Petrank | Technion, Israel |
Bart Preneel | K. U. Leuven, Belgium |
Ron Rivest | Massachusetts Institute of Technology, USA |
Rei Safavi-Naini | University of Wollongong, Australia |
Dan Simon | Microsoft Research, USA |
Nigel Smart | University of Bristol, England |
Markus Stadler | Crypto AG, Switzerland |
Eric Verheul | PricewaterhouseCoopers, the Netherlands |
Yiqun Lisa Yin | NTT MCL, USA |
Advisory Members
Joe Kilian (Crypto 2001, Program Chair) | NEC, USA |
Dan Boneh (Crypto 2003, Program Chair) | Stanford University, USA |
Block Ciphers
-
Sean Murphy
,
Matthew J. B. Robshaw
:
Essential Algebraic Structure within the AES (.ps) 1-16
BibTeX -
Antoine Joux
,
Gwenaëlle Martinet
,
Frédéric Valette
:
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC (.ps) 17-30
BibTeX -
Moses Liskov
,
Ronald L. Rivest
,
David Wagner
:
Tweakable Block Ciphers (.ps) 31-46
BibTeX
Multi-user Oriented Cryptosystems
-
Dani Halevy
,
Adi Shamir
:
The LSD Broadcast Encryption Scheme 47-60
BibTeX -
Jan Camenisch
,
Anna Lysyanskaya
:
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials (.ps) 61-76
BibTeX
Foundations and Methodology
-
Nicholas J. Hopper
,
John Langford
,
Luis von Ahn
:
Provably Secure Steganography (.ps) 77-92
BibTeX -
Jacques Stern
,
David Pointcheval
,
John Malone-Lee
,
Nigel P. Smart
:
Flaws in Applying Proof Methodologies to Signature Schemes (.ps) 93-110
BibTeX -
Jesper Buus Nielsen
:
Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case (.ps) 111-126
BibTeX
Security of Practical Protocols
-
Jakob Jonsson
,
Burton S. Kaliski Jr.
:
On the Security of RSA Encryption in TLS (.ps) 127-142
BibTeX -
Ran Canetti
,
Hugo Krawczyk
:
Security Analysis of IKE's Signature-Based Key-Exchange Protocol (.ps) 143-161
BibTeX -
Mihir Bellare
,
Adriana Palacio
:
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks (.ps) 162-177
BibTeX
Secure Multiparty Computation
-
Rosario Gennaro
,
Yuval Ishai
,
Eyal Kushilevitz
,
Tal Rabin
:
On 2-Round Secure Multiparty Computation (.ps) 178-193
BibTeX -
Markus Bläser
,
Andreas Jakoby
,
Maciej Liskiewicz
,
Bodo Siebert
:
Private Computation - k-Connected versus 1-Connected Networks (.ps) 194-209
BibTeX
Public-Key Encryption
-
Phong Q. Nguyen
,
David Pointcheval
:
Analysis and Improvements of NTRU Encryption Paddings (.ps) 210-225
BibTeX -
Jean-Sébastien Coron
,
Marc Joye
,
David Naccache
,
Pascal Paillier
:
Universal Padding Schemes for RSA (.ps) 226-241
BibTeX -
Alexander May
:
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent (.ps) 242-256
BibTeX
Information Theory and Secret Sharing
-
Chi-Jen Lu
:
Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors (.ps) 257-271
BibTeX -
Ronald Cramer
,
Serge Fehr
:
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups (.ps) 272-287
BibTeX
Cipher Design and Analysis
-
David Wagner
:
A Generalized Birthday Problem (.ps) 288-303
BibTeX -
Ilya Mironov
:
(Not So) Random Shuffles of RC4 (.ps) 304-319
BibTeX -
John Black
,
Phillip Rogaway
,
Thomas Shrimpton
:
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV (.ps) 320-335
BibTeX
Elliptic Curves and Abelian Varieties
-
Karl Rubin
,
Alice Silverberg
:
Supersingular Abelian Varieties in Cryptology (.ps) 336-353
BibTeX -
Paulo S. L. M. Barreto
,
Hae Yong Kim
,
Ben Lynn
,
Michael Scott
:
Efficient Algorithms for Pairing-Based Cryptosystems (.ps) 354-368
BibTeX -
Frederik Vercauteren
:
Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2 (.ps) 369-384
BibTeX
Password-Based Authentication
-
Philip D. MacKenzie
,
Thomas Shrimpton
,
Markus Jakobsson
:
Threshold Password-Authenticated Key Exchange (.ps) 385-400
BibTeX
Distributed Cryptosystems
-
Jesper Buus Nielsen
:
A Threshold Pseudorandom Function Construction and Its Applications (.ps) 401-416
BibTeX -
Joy Algesheimer
,
Jan Camenisch
,
Victor Shoup
:
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products (.ps) 417-432
BibTeX
Pseudorandomness and Applications
-
Wen-Ching W. Li
,
Mats Näslund
,
Igor Shparlinski
:
Hidden Number Problem with the Trace and Bit Security of XTR and LUC (.ps) 433-448
BibTeX -
Ivan Damgård
,
Jesper Buus Nielsen
:
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security 449-464
BibTeX
Variations on Signatures and Authentication
-
Emmanuel Bresson
,
Jacques Stern
,
Michael Szydlo
:
Threshold Ring Signatures and Applications to Ad-hoc Groups (.ps) 465-480
BibTeX -
Moni Naor
:
Deniable Ring Authentication (.ps) 481-498
BibTeX -
Gene Itkis
,
Leonid Reyzin
:
SiBIR: Signer-Base Intrusion-Resilient Signatures (.ps) 499-514
BibTeX
Stream Ciphers and Boolean Functions
-
Don Coppersmith
,
Shai Halevi
,
Charanjit S. Jutla
:
Cryptanalysis of Stream Ciphers with Linear Masking (.ps) 515-532
BibTeX -
Palash Sarkar
:
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers (.ps) 533-548
BibTeX -
Claude Carlet
:
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction (.ps) 549-564
BibTeX
Commitment Schemes
-
Serge Fehr
,
Ueli M. Maurer
:
Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks (.ps) 565-580
BibTeX -
Ivan Damgård
,
Jesper Buus Nielsen
:
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor (.ps) 581-596
BibTeX
Signature Schemes
-
Anna Lysyanskaya
:
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation (.ps) 597-612
BibTeX -
Jean-Sébastien Coron
:
Security Proof for Partial-Domain Hash Signature Schemes (.ps) 613-626
BibTeX