Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18--22, 2002. Proceedings (Q701691)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18--22, 2002. Proceedings
scientific article

    Statements

    Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18--22, 2002. Proceedings (English)
    0 references
    0 references
    7 November 2002
    0 references
    The articles of mathematical interest will be reviewed individually. The preceding conference (21st, 2001) has been reviewed (see Zbl 0969.00102). Indexed articles: \textit{Murphy, Sean; Robshaw, Matthew J. B.}, Essential algebraic structure within the AES, 1-16 [Zbl 1026.94537] \textit{Joux, Antoine; Martinet, Gwenaëlle; Valette, Frédéric}, Blockwise-adaptive attackers. Revisiting the (in)security of some provably secure encryption modes: CBC, GEM, IACBC, 17-30 [Zbl 1026.94531] \textit{Liskov, Moses; Rivest, Ronald L.; Wagner, David}, Tweakable block ciphers, 31-46 [Zbl 1026.94533] \textit{Halevy, Dani; Shamir, Adi}, The LSD broadcast encryption scheme, 47-60 [Zbl 1026.94528] \textit{Camenisch, Jan; Lysyanskaya, Anna}, Dynamic accumulators and application to efficient revocation of anonymous credentials, 61-76 [Zbl 1026.94545] \textit{Hopper, Nicholas J.; Langford, John; von Ahn, Luis}, Provably secure steganography, 77-92 [Zbl 1026.94529] \textit{Stern, Jacques; Pointcheval, David; Malone-Lee, John; Smart, Nigel P.}, Flaws in applying proof methodologies to signature schemes, 93-110 [Zbl 1026.94550] \textit{Nielsen, Jesper Buus}, Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case, 111-126 [Zbl 1027.68601] \textit{Jonsson, Jakob; Kaliski, Burton S. jun.}, On the security of RSA encryption in TLS, 127-142 [Zbl 1026.94530] \textit{Canetti, Ran; Krawczyk, Hugo}, Security analysis of IKE's signature-based key-exchange protocol, 143-161 [Zbl 1026.94524] \textit{Bellare, Mihir; Palacio, Adriana}, GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks, 162-177 [Zbl 1026.94521] \textit{Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal}, On 2-round secure multiparty computation, 178-193 [Zbl 1026.94527] \textit{Bläser, Markus; Jakoby, Andreas; Liśkiewicz, Maciej; Siebert, Bodo}, Private computation -- \(k\)-connected versus 1-connected networks, 194-209 [Zbl 1026.94523] \textit{Nguyen, Phong Q.; Pointcheval, David}, Analysis and improvements of NTRU encryption paddings, 210-225 [Zbl 1026.94538] \textit{Coron, Jean-Sébastien; Joye, Marc; Naccache, David; Paillier, Pascal}, Universal padding schemes for RSA, 226-241 [Zbl 1026.94526] \textit{May, Alexander}, Cryptanalysis of unbalanced RSA with small CRT-exponent, 242-256 [Zbl 1026.94535] \textit{Lu, Chi-Jen}, Hyper-encryption against space-bounded adversaries from on-line strong extractors, 257-271 [Zbl 1027.68057] \textit{Cramer, Ronald; Fehr, Serge}, Optimal black-box secret sharing over arbitrary Abelian groups, 272-287 [Zbl 1026.94546] \textit{Wagner, David}, A generalized birthday problem, 288-303 [Zbl 1026.94541] \textit{Mironov, Ilya}, (Not so) random shuffles of RC4, 304-319 [Zbl 1027.68058] \textit{Black, John; Rogaway, Phillip; Shrimpton, Thomas}, Black-box analysis of the block-cipher-based hash-function constructions from PGV, 320-335 [Zbl 1026.94522] \textit{Rubin, Karl; Silverberg, Alice}, Supersingular Abelian varieties in cryptology, 336-353 [Zbl 1026.94540] \textit{Barreto, Paulo S. L. M.; Kim, Hae Y.; Lynn, Ben; Scott, Michael}, Efficient algorithms for pairing-based cryptosystems, 354-368 [Zbl 1026.94520] \textit{Vercauteren, Frederik}, Computing zeta functions of hyperelliptic curves over finite fields of characteristic 2, 369-384 [Zbl 1023.14007] \textit{MacKenzie, Philip; Shrimpton, Thomas; Jakobsson, Markus}, Threshold password-authenticated key exchange, 385-400 [Zbl 1026.94548] \textit{Nielsen, Jesper Buus}, A threshold pseudorandom function construction and its applications, 401-416 [Zbl 1026.94539] \textit{Algesheimer, Joy; Camenisch, Jan; Shoup, Victor}, Efficient computation modulo a shared secret with application to the generation of shared safe-prime products, 417-432 [Zbl 1026.94543] \textit{Li, Wen-Ching W.; Näslund, Mats; Shparlinski, Igor E.}, Hidden number problem with the trace and bit security of XTR and LUC, 433-448 [Zbl 1026.94532] \textit{Damgård, Ivan; Nielsen, Jesper Buus}, Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security, 449-464 [Zbl 1027.68056] \textit{Bresson, Emmanuel; Stern, Jacques; Szydlo, Michael}, Threshold ring signatures and applications to ad-hoc groups, 465-480 [Zbl 1026.94544] \textit{Naor, Moni}, Deniable ring authentication, 481-498 [Zbl 1026.94549] \textit{Itkis, Gene; Reyzin, Leonid}, SiBIR: Signer-base intrusion-resilient signatures, 499-514 [Zbl 1026.94547] \textit{Coppersmith, Don; Halevi, Shai; Jutla, Charanjit}, Cryptanalysis of stream ciphers with linear masking, 515-532 [Zbl 1026.94525] \textit{Sarkar, Palash}, The filter-combiner model for memoryless synchronous stream ciphers, 533-548 [Zbl 1026.94519] \textit{Carlet, Claude}, A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction, 549-564 [Zbl 1026.94518] \textit{Fehr, Serge; Maurer, Ueli}, Linear VSS and distributed commitments based on secret sharing and pairwise checks, 565-580 [Zbl 1028.94509] \textit{Damgård, Ivan; Nielsen, Jesper Buus}, Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor, 581-596 [Zbl 1028.94505] \textit{Lysyanskaya, Anna}, Unique signatures and verifiable random functions from the DH-DDH separation, 597-612 [Zbl 1028.94511] \textit{Coron, Jean-Sébastien}, Security proof for partial-domain hash signature schemes, 613-626 [Zbl 1028.94508]
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    Santa Barbara, CA (USA)
    0 references
    Proceedings
    0 references
    Conference
    0 references
    CRYPTO 2002
    0 references
    Cryptology
    0 references
    0 references