


Остановите войну!
for scientists:


default search action
EUROCRYPT 2002: Amsterdam, The Netherlands
- Lars R. Knudsen:
Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings. Lecture Notes in Computer Science 2332, Springer 2002, ISBN 3-540-43553-0
Cryptanalysis I
- Rosario Gennaro, Daniele Micciancio
:
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups. 1-13 - Sangjin Lee, Eonkyung Lee:
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups. 14-28 - Steven D. Galbraith, Florian Hess, Nigel P. Smart:
Extending the GHS Weil Descent Attack. 29-44
Public-Key Enryption
- Ronald Cramer, Victor Shoup:
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. 45-64 - Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung:
Key-Insulated Public Key Cryptosystems. 65-82 - Jee Hea An, Yevgeniy Dodis, Tal Rabin:
On the Security of Joint Signature and Encryption. 83-107
Invited Talk
- Joan Daemen, Vincent Rijmen:
AES and the Wide Trail Design Strategy. 108-109
Information Theory & New Models
- Ueli M. Maurer:
Indistinguishability of Random Systems. 110-132 - Alexander Russell
, Hong Wang:
How to Fool an Unbounded Adversary with a Short Key. 133-148 - David P. Woodruff, Marten van Dijk
:
Cryptography in an Unbounded Computational Model. 149-164
Implementational Analysis
- Junko Nakajima, Mitsuru Matsui:
Performance Analysis and Parallel Implementation of Dedicated Hash Functions. 165-180 - John A. Clark, Jeremy L. Jacob:
Fault Injection and a Timing Channel on an Analysis Technique. 181-196 - Young-Ho Park, Sangtae Jeong, Jongin Lim:
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms. 197-208
Stream Ciphers
- Philippe Chose, Antoine Joux, Michel Mitton:
Fast Correlation Attacks: An Algorithmic Point of View. 209-221 - Matthias Krause:
BDD-Based Cryptanalysis of Keystream Generators. 222-237 - Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari
:
Linear Cryptanalysis of Bluetooth Stream Cipher. 238-255
Digital Signatures I
- Ivan Damgård, Maciej Koprowski:
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups. 256-271 - Jean-Sébastien Coron:
Optimal Security Proofs for PSS and Other Signature Schemes. 272-287
Cryptanalysis II
- Henri Gilbert, Marine Minier:
Cryptanalysis of SFLASH. 288-298 - Craig Gentry, Michael Szydlo:
Cryptanalysis of the Revised NTRU Signature Scheme. 299-320
Key Exchange
- Emmanuel Bresson, Olivier Chevassut, David Pointcheval
:
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. 321-336 - Ran Canetti, Hugo Krawczyk:
Universally Composable Notions of Key Exchange and Secure Channels. 337-351 - Donald Beaver:
On Deniability in Quantum Key Exchange. 352-367
Modes of Operation
- Anand Desai, Alejandro Hevia
, Yiqun Lisa Yin:
A Practice-Oriented Treatment of Pseudorandom Number Generators. 368-383 - John Black, Phillip Rogaway:
A Block-Cipher Mode of Operation for Parallelizable Message Authentication. 384-397
Invited Talk
- Stephen T. Kent:
Rethinking PKI: What's Trust Got to Do with It? 398-399
Digital Signatures II
- Tal Malkin, Daniele Micciancio
, Sara K. Miner:
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods. 400-417 - Michel Abdalla
, Jee Hea An, Mihir Bellare, Chanathip Namprempre:
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. 418-433 - Junji Shikata, Goichiro Hanaoka, Yuliang Zheng
, Hideki Imai:
Security Notions for Unconditionally Secure Signature Schemes. 434-449
Traitor Tracing & Id-Based Encryption
- Aggelos Kiayias, Moti Yung:
Traitor Tracing with Constant Transmission Rate. 450-465 - Jeremy Horwitz, Ben Lynn:
Toward Hierarchical Identity-Based Encryption. 466-481
Multiparty and Multicast
- Matthias Fitzi, Nicolas Gisin, Ueli M. Maurer, Oliver von Rotz:
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch. 482-501 - Yvo Desmedt, Yongge Wang:
Perfectly Secure Message Transmission Revisited. 502-517
Symmetric Cryptology
- Anne Canteaut, Marion Videau:
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. 518-533 - Serge Vaudenay:
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... 534-546

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.