{"entities":{"Q701691":{"pageid":703540,"ns":120,"title":"Item:Q701691","lastrevid":63814710,"modified":"2026-04-11T15:43:36Z","type":"item","id":"Q701691","labels":{"en":{"language":"en","value":"Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18--22, 2002. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1824865"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q701691$5C22C97D-BE8E-477F-A431-C2F553983B49","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"fb4ae37a7f6beef25638387cb577924eaf12ffde","datavalue":{"value":{"text":"Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18--22, 2002. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q701691$75772750-C92E-49F0-A6A1-4C0611353636","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"819ffa8a5e63cd85d37c8fef2de055e70080867c","datavalue":{"value":"0997.00039","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q701691$8F3370C0-F87D-4971-B8DB-6042C1304276","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"3f1900e701bbf8e76ce2e5dc76cf321ec5ad4e43","datavalue":{"value":"10.1007/3-540-45708-9","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q701691$956B6ACF-C289-4CC4-A5B1-DCB17E3735A5","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q701691$A38E26C2-9C9D-45F1-81F2-F2B16B1B19DC","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"17316e88e5ef0a679faa075220250a060b94ddba","datavalue":{"value":{"time":"+2002-11-07T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q701691$BF347FCB-1E28-4D91-A262-3554378122A6","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"164a76f3addf3a51669dd3feb327f11ddbd34d75","datavalue":{"value":"The articles of mathematical interest will be reviewed individually. The preceding conference (21st, 2001) has been reviewed (see Zbl 0969.00102).  Indexed articles:  \\textit{Murphy, Sean; Robshaw, Matthew J. B.}, Essential algebraic structure within the AES, 1-16 [Zbl 1026.94537]  \\textit{Joux, Antoine; Martinet, Gwena\u00eblle; Valette, Fr\u00e9d\u00e9ric}, Blockwise-adaptive attackers. Revisiting the (in)security of some provably secure encryption modes: CBC, GEM, IACBC, 17-30 [Zbl 1026.94531]  \\textit{Liskov, Moses; Rivest, Ronald L.; Wagner, David}, Tweakable block ciphers, 31-46 [Zbl 1026.94533]  \\textit{Halevy, Dani; Shamir, Adi}, The LSD broadcast encryption scheme, 47-60 [Zbl 1026.94528]  \\textit{Camenisch, Jan; Lysyanskaya, Anna}, Dynamic accumulators and application to efficient revocation of anonymous credentials, 61-76 [Zbl 1026.94545]  \\textit{Hopper, Nicholas J.; Langford, John; von Ahn, Luis}, Provably secure steganography, 77-92 [Zbl 1026.94529]  \\textit{Stern, Jacques; Pointcheval, David; Malone-Lee, John; Smart, Nigel P.}, Flaws in applying proof methodologies to signature schemes, 93-110 [Zbl 1026.94550]  \\textit{Nielsen, Jesper Buus}, Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case, 111-126 [Zbl 1027.68601]  \\textit{Jonsson, Jakob; Kaliski, Burton S. jun.}, On the security of RSA encryption in TLS, 127-142 [Zbl 1026.94530]  \\textit{Canetti, Ran; Krawczyk, Hugo}, Security analysis of IKE's signature-based key-exchange protocol, 143-161 [Zbl 1026.94524]  \\textit{Bellare, Mihir; Palacio, Adriana}, GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks, 162-177 [Zbl 1026.94521]  \\textit{Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal}, On 2-round secure multiparty computation, 178-193 [Zbl 1026.94527]  \\textit{Bl\u00e4ser, Markus; Jakoby, Andreas; Li\u015bkiewicz, Maciej; Siebert, Bodo}, Private computation -- \\(k\\)-connected versus 1-connected networks, 194-209 [Zbl 1026.94523]  \\textit{Nguyen, Phong Q.; Pointcheval, David}, Analysis and improvements of NTRU encryption paddings, 210-225 [Zbl 1026.94538]  \\textit{Coron, Jean-S\u00e9bastien; Joye, Marc; Naccache, David; Paillier, Pascal}, Universal padding schemes for RSA, 226-241 [Zbl 1026.94526]  \\textit{May, Alexander}, Cryptanalysis of unbalanced RSA with small CRT-exponent, 242-256 [Zbl 1026.94535]  \\textit{Lu, Chi-Jen}, Hyper-encryption against space-bounded adversaries from on-line strong extractors, 257-271 [Zbl 1027.68057]  \\textit{Cramer, Ronald; Fehr, Serge}, Optimal black-box secret sharing over arbitrary Abelian groups, 272-287 [Zbl 1026.94546]  \\textit{Wagner, David}, A generalized birthday problem, 288-303 [Zbl 1026.94541]  \\textit{Mironov, Ilya}, (Not so) random shuffles of RC4, 304-319 [Zbl 1027.68058]  \\textit{Black, John; Rogaway, Phillip; Shrimpton, Thomas}, Black-box analysis of the block-cipher-based hash-function constructions from PGV, 320-335 [Zbl 1026.94522]  \\textit{Rubin, Karl; Silverberg, Alice}, Supersingular Abelian varieties in cryptology, 336-353 [Zbl 1026.94540]  \\textit{Barreto, Paulo S. L. M.; Kim, Hae Y.; Lynn, Ben; Scott, Michael}, Efficient algorithms for pairing-based cryptosystems, 354-368 [Zbl 1026.94520]  \\textit{Vercauteren, Frederik}, Computing zeta functions of hyperelliptic curves over finite fields of characteristic 2, 369-384 [Zbl 1023.14007]  \\textit{MacKenzie, Philip; Shrimpton, Thomas; Jakobsson, Markus}, Threshold password-authenticated key exchange, 385-400 [Zbl 1026.94548]  \\textit{Nielsen, Jesper Buus}, A threshold pseudorandom function construction and its applications, 401-416 [Zbl 1026.94539]  \\textit{Algesheimer, Joy; Camenisch, Jan; Shoup, Victor}, Efficient computation modulo a shared secret with application to the generation of shared safe-prime products, 417-432 [Zbl 1026.94543]  \\textit{Li, Wen-Ching W.; N\u00e4slund, Mats; Shparlinski, Igor E.}, Hidden number problem with the trace and bit security of XTR and LUC, 433-448 [Zbl 1026.94532]  \\textit{Damg\u00e5rd, Ivan; Nielsen, Jesper Buus}, Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security, 449-464 [Zbl 1027.68056]  \\textit{Bresson, Emmanuel; Stern, Jacques; Szydlo, Michael}, Threshold ring signatures and applications to ad-hoc groups, 465-480 [Zbl 1026.94544]  \\textit{Naor, Moni}, Deniable ring authentication, 481-498 [Zbl 1026.94549]  \\textit{Itkis, Gene; Reyzin, Leonid}, SiBIR: Signer-base intrusion-resilient signatures, 499-514 [Zbl 1026.94547]  \\textit{Coppersmith, Don; Halevi, Shai; Jutla, Charanjit}, Cryptanalysis of stream ciphers with linear masking, 515-532 [Zbl 1026.94525]  \\textit{Sarkar, Palash}, The filter-combiner model for memoryless synchronous stream ciphers, 533-548 [Zbl 1026.94519]  \\textit{Carlet, Claude}, A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction, 549-564 [Zbl 1026.94518]  \\textit{Fehr, Serge; Maurer, Ueli}, Linear VSS and distributed commitments based on secret sharing and pairwise checks, 565-580 [Zbl 1028.94509]  \\textit{Damg\u00e5rd, Ivan; Nielsen, Jesper Buus}, Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor, 581-596 [Zbl 1028.94505]  \\textit{Lysyanskaya, Anna}, Unique signatures and verifiable random functions from the DH-DDH separation, 597-612 [Zbl 1028.94511]  \\textit{Coron, Jean-S\u00e9bastien}, Security proof for partial-domain hash signature schemes, 613-626 [Zbl 1028.94508]","type":"string"},"datatype":"string"},"type":"statement","id":"Q701691$F517186F-3C54-48C2-A9C8-8AEE48CCBFF9","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q701691$C06E1292-86C4-45C5-9DFC-EE3C0880FA2A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q701691$E8F14A1D-BD8A-4388-B0DF-948E10FC1DD5","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q701691$9E24435F-ACEF-4311-A632-D42E33C55997","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q701691$0A30DDDA-2853-431C-942D-47B328A2F3F1","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b71b42e4e887bf125b7436fe1334aef39047fb5c","datavalue":{"value":"94A62","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q701691$ACE686F6-CA78-4BCB-A6CC-4521D9080AD1","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q701691$C8599CC5-6DBA-4FBC-8957-720C3BEB45B1","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"cf6b360a463b3d5db4e4ae6a28f94f1362d983dd","datavalue":{"value":"1824865","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q701691$E6861C08-E24C-4F9A-B851-ECC3FF914B85","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"72673ac97426519cbf4390be6951e1b2520429b9","datavalue":{"value":"Santa Barbara, CA (USA)","type":"string"},"datatype":"string"},"type":"statement","id":"Q701691$3BAF8127-FCC9-45E1-BBDB-03C6AFABE1B4","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q701691$C334615C-B3E4-4433-B7F3-A50F590A5EAC","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q701691$552BAC92-D464-4139-8971-F595D4096E02","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"80853538f13e42233e618220f0230919f832781b","datavalue":{"value":"CRYPTO 2002","type":"string"},"datatype":"string"},"type":"statement","id":"Q701691$5D8BFC84-D909-423D-8E2A-53252060F1BD","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9444c7e81fc487ab48d60d555be7e74462154789","datavalue":{"value":"Cryptology","type":"string"},"datatype":"string"},"type":"statement","id":"Q701691$653B30AF-B0FF-4CDE-99E1-D4E6A0810842","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q701691$A0A3084C-9F68-40D2-AA34-D6263156DC41","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"daa25d630694a42be92a1f90d7f4e8dad0c8cfc9","datavalue":{"value":"https://doi.org/10.1007/3-540-45708-9","type":"string"},"datatype":"url"},"type":"statement","id":"Q701691$D304BECA-E851-48B8-B95B-3AB32A69F870","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"8714a18ab1194c8dfc8c3e1948e613c381212c3f","datavalue":{"value":"W1507330542","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q701691$DE4DA1D8-0BC9-423A-98EF-F0BE4265B5B8","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18--22, 2002. Proceedings","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Advances_in_cryptology_-_CRYPTO_2002._22nd_annual_international_cryptology_conference,_Santa_Barbara,_CA,_USA,_August_18--22,_2002._Proceedings"}}}}}