Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6--10, 2001. Proceedings (Q5933585)
From MaRDI portal
scientific article; zbMATH DE number 1599481
Language | Label | Description | Also known as |
---|---|---|---|
English | Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6--10, 2001. Proceedings |
scientific article; zbMATH DE number 1599481 |
Statements
Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6--10, 2001. Proceedings (English)
0 references
16 May 2001
0 references
The articles of this volume will be reviewed individually. The preceding conference (19th, 2000) has been reviewed (see Zbl 0939.00052). Indexed articles: \textit{Vercauteren, Frederik; Preneel, Bart; Vandewalle, Joos}, A memory efficient version of Satoh's algorithm, 1-13 [Zbl 1009.11052] \textit{Fouquet, Mireille; Gaudry, Pierrick; Harley, Robert}, Finding secure curves with the Satoh-FGH algorithm and an early-abort strategy, 14-29 [Zbl 1010.94554] \textit{Smart, Nigel P.}, How secure are elliptic curves over composite extension fields?, 30-39 [Zbl 0981.94011] \textit{Di Crescenzo, Giovanni; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam}, Efficient and non-interactive non-malleable commitment, 40-59 [Zbl 0981.94035] \textit{Crépeau, Claude; Légaré, Frédéric; Salvail, Louis}, How to convert the flavor of a quantum bit commitment, 60-77 [Zbl 0981.94012] \textit{Katz, Jonathan; Myers, Steven; Ostrovsky, Rafail}, Cryptographic counters and applications to electronic voting, 78-92 [Zbl 0981.94033] \textit{Camenisch, Jan; Lysyanskaya, Anna}, An efficient system for non-transferable anonymous credentials with optional anonymity revocation, 93-118 [Zbl 0981.94043] \textit{Aiello, Bill; Ishai, Yuval; Reingold, Omer}, Priced oblivious transfer: how to sell digital goods, 119-135 [Zbl 0981.94042] \textit{Abe, Masayuki}, A secure three-move blind signature scheme for polynomially many signatures, 136-151 [Zbl 0981.94031] \textit{Damgård, Ivan; Koprowski, Maciej}, Practical threshold RSA signatures without a trusted dealer, 152-165 [Zbl 0981.94041] \textit{Mironov, Ilya}, Hash functions: from Merkle-Damgård to Shoup, 166-181 [Zbl 0981.94010] \textit{Gentry, Craig}, Key recovery and message attacks on NTRU-composite, 182-194 [Zbl 0981.94013] \textit{Verheul, Eric R.}, Evidence that XTR is more secure than supersingular elliptic curve cryptosystems, 195-210 [Zbl 0981.94009] \textit{Hoffstein, Jeffrey; Pipher, Jill; Silverman, Joseph H.}, NSS: an NTRU lattice-based signature scheme, 211-228 [Zbl 0981.94039] \textit{Catalano, Dario; Gennaro, Rosario; Howgrave-Graham, Nick}, The bit security of Paillier's encryption scheme and its applications, 229-243 [Zbl 0981.94016] \textit{Sadeghi, Ahmad-Reza; Steiner, Michael}, Assumptions related to discrete logarithms: Why subtleties make a real difference, 244-261 [Zbl 0981.94018] \textit{Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal}, On adaptive vs. non-adaptive security of multiparty protocols, 262-279 [Zbl 0981.94040] \textit{Cramer, Ronald; Damgård, Ivan; Nielsen, Jesper B.}, Multiparty computation from threshold homomorphic encryption, 280-300 [Zbl 1010.94553] \textit{Dodis, Yevgeniy; Sahai, Amit; Smith, Adam}, On perfect and adaptive security in exposure-resilient cryptography, 301-324 [Zbl 0981.94014] \textit{Kühn, Ulrich}, Cryptanalysis of reduced-round MISTY, 325-339 [Zbl 1009.94570] \textit{Biham, Eli; Dunkelman, Orr; Keller, Nathan}, The rectangle attack -- rectangling the Serpent, 340-357 [Zbl 0981.94017] \textit{Myers, Steven}, Efficient amplification of the security of weak pseudo-random function generators, 358-372 [Zbl 0981.94019] \textit{Micali, Silvio; Reyzin, Leonid}, Min-round resettable zero-knowledge in the public-key model, 373-393 [Zbl 0981.94038] \textit{Biryukov, Alex; Shamir, Adi}, Structural cryptanalysis of SASAS, 394-405 [Zbl 0981.94015] \textit{Youssef, Amr M.; Gong, Guang}, Hyper-bent functions, 406-419 [Zbl 1013.94544] \textit{Keliher, Liam; Meijer, Henk; Tavares, Stafford}, New method for upper bounding the maximum average linear hull probability for SPNs, 420-436 [Zbl 1015.94546] \textit{Boneh, Dan; Durfee, Glenn; Franklin, Matt}, Lower bounds for multicast message authentication, 437-452 [Zbl 0981.94037] \textit{Canetti, Ran; Krawczyk, Hugo}, Analysis of key-exchange protocols and their use for building secure channels, 453-474 [Zbl 0981.94032] \textit{Katz, Jonathan; Ostrovsky, Rafail; Yung, Moti}, Efficient password-authenticated key exchange using human-memorable passwords, 475-494 [Zbl 1010.94555] \textit{Bellare, Mihir; Fischlin, Marc; Goldwasser, Shafi; Micali, Silvio}, Identification protocols secure against reset attacks, 495-511 [Zbl 1012.94554] \textit{An, Jee Hea; Bellare, Mihir}, Does encryption with redundancy provide authenticity?, 512-528 [Zbl 0981.94034] \textit{Jutla, Charanjit S.}, Encryption modes with almost free message integrity, 529-544 [Zbl 0981.94036]
0 references
Innsbruck (Austria)
0 references
Proceedings
0 references
Conference
0 references
EUROCRYPT 2001
0 references
Cryptographic techniques
0 references