What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 2002
Year
Venue
Title
2002
CRYPTO
(Not So) Random Shuffles of RC4
Ilya Mironov
2002
CRYPTO
A Generalized Birthday Problem
David Wagner
2002
CRYPTO
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction
Claude Carlet
2002
CRYPTO
A Threshold Pseudorandom Function Construction and Its Applications
Jesper Buus Nielsen
2002
CRYPTO
Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings
2002
CRYPTO
Analysis and Improvements of NTRU Encryption Paddings
Phong Q. Nguyen
David Pointcheval
2002
CRYPTO
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
John Black
Phillip Rogaway
Thomas Shrimpton
2002
CRYPTO
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC
Antoine Joux
Gwenaëlle Martinet
Frédéric Valette
2002
CRYPTO
Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2
Frederik Vercauteren
2002
CRYPTO
Cryptanalysis of Stream Ciphers with Linear Masking
Don Coppersmith
Shai Halevi
Charanjit S. Jutla
2002
CRYPTO
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent
Alexander May
2002
CRYPTO
Deniable Ring Authentication
Moni Naor
2002
CRYPTO
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
Jan Camenisch
Anna Lysyanskaya
2002
CRYPTO
Efficient Algorithms for Pairing-Based Cryptosystems
Paulo S. L. M. Barreto
Hae Yong Kim
Ben Lynn
Michael Scott
2002
CRYPTO
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
Joy Algesheimer
Jan Camenisch
Victor Shoup
2002
CRYPTO
Essential Algebraic Structure within the AES
Sean Murphy
Matthew J. B. Robshaw
2002
CRYPTO
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security
Ivan Damgård
Jesper Buus Nielsen
2002
CRYPTO
Flaws in Applying Proof Methodologies to Signature Schemes
Jacques Stern
David Pointcheval
John Malone-Lee
Nigel P. Smart
2002
CRYPTO
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
Mihir Bellare
Adriana Palacio
2002
CRYPTO
Hidden Number Problem with the Trace and Bit Security of XTR and LUC
Wen-Ching W. Li
Mats Näslund
Igor E. Shparlinski
2002
CRYPTO
Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors
Chi-Jen Lu
2002
CRYPTO
Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks
Serge Fehr
Ueli Maurer
2002
CRYPTO
New Directions in Quantum Cryptographic Protocols
★
Invited talk
Andrew Chi-Chih Yao
2002
CRYPTO
On 2-Round Secure Multiparty Computation
Rosario Gennaro
Yuval Ishai
Eyal Kushilevitz
Tal Rabin
2002
CRYPTO
On the Security of RSA Encryption in TLS
Jakob Jonsson
Burton S. Kaliski Jr.
2002
CRYPTO
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
Ronald Cramer
Serge Fehr
2002
CRYPTO
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
Ivan Damgård
Jesper Buus Nielsen
2002
CRYPTO
Private Computation - k-Connected versus 1-Connected Networks
Markus Bläser
Andreas Jakoby
Maciej Liskiewicz
Bodo Siebert
2002
CRYPTO
Provably Secure Steganography
Nicholas J. Hopper
John Langford
Luis von Ahn
2002
CRYPTO
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
Ran Canetti
Hugo Krawczyk
2002
CRYPTO
Security Proof for Partial-Domain Hash Signature Schemes
Jean-Sébastien Coron
2002
CRYPTO
Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case
Jesper Buus Nielsen
2002
CRYPTO
SiBIR: Signer-Base Intrusion-Resilient Signatures
Gene Itkis
Leonid Reyzin
2002
CRYPTO
Supersingular Abelian Varieties in Cryptology
Karl Rubin
Alice Silverberg
2002
CRYPTO
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
Palash Sarkar
2002
CRYPTO
The LSD Broadcast Encryption Scheme
Dani Halevy
Adi Shamir
2002
CRYPTO
Threshold Password-Authenticated Key Exchange
Philip D. MacKenzie
Thomas Shrimpton
Markus Jakobsson
2002
CRYPTO
Threshold Ring Signatures and Applications to Ad-hoc Groups
Emmanuel Bresson
Jacques Stern
Michael Szydlo
2002
CRYPTO
Tweakable Block Ciphers
Moses Liskov
Ronald L. Rivest
David Wagner
2002
CRYPTO
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
Anna Lysyanskaya
2002
CRYPTO
Universal Padding Schemes for RSA
Jean-Sébastien Coron
Marc Joye
David Naccache
Pascal Paillier