Title:
Advances in cryptology-EUROCRYT 2002 : international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedings
Conference Author:
Series:
Lecture notes in computer science ; 2332
Publication Information:
New York, NY : Springer-Verlag, 2002
ISBN:
9783540435532
Added Author:
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010061219 | QA76.9.A25 E87 2002 | Open Access Book | Proceedings, Conference, Workshop etc. | Searching... |
On Order
Summary
Summary
This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2002, held in Amsterdam, The Netherlands, in April/May 2002.
The 33 revised full papers presented were carefully reviewed and selected from a total of 122 submissions. The papers are organized in topical sections on cryptanalysis, public-key encryption, information theory and new models, implementational analysis, stream ciphers, digital signatures, key exchange, modes of operation, traitor tracing and id-based encryption, multiparty and multicast, and symmetric cryptology.
Table of Contents
Cryptanalysis I | |
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups | p. 1 |
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups | p. 14 |
Extending the GHS Weil Descent Attack | p. 29 |
Public-Key Encryption | |
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption | p. 45 |
Key-Insulated Public Key Cryptosystems | p. 65 |
On the Security of Joint Signature and Encryption | p. 83 |
Invited Talk | |
AES and the Wide Trail Design Strategy | p. 108 |
Information Theory & New Models | |
Indistinguishability of Random Systems | p. 110 |
How to Fool an Unbounded Adversary with a Short Key | p. 133 |
Cryptography in an Unbounded Computational Model | p. 149 |
Implementational Analysis | |
Performance Analysis and Parallel Implementation of Dedicated Hash Functions | p. 165 |
Fault Injection and a Timing Channel on an Analysis Technique | p. 181 |
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms | p. 197 |
Stream Ciphers | |
Fast Correlation Attacks: An Algorithmic Point of View | p. 209 |
BDD-Based Cryptanalysis of Keystream Generators | p. 222 |
Linear Cryptanalysis of Bluetooth Stream Cipher | p. 238 |
Digital Signatures I | |
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups | p. 256 |
Optimal Security Proofs for PSS and Other Signature Schemes | p. 272 |
Cryptanalysis II | |
Cryptanalysis of SFLASH | p. 288 |
Cryptanalysis of the Revised NTRU Signature Scheme | p. 299 |
Key Exchange | |
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions | p. 321 |
Universally Composable Notions of Key Exchange and Secure Channels | p. 337 |
On Deniability in Quantum Key Exchange | p. 352 |
Modes of Operation | |
A Practice-Oriented Treatment of Pseudorandom Number Generators | p. 368 |
A Block-Cipher Mode of Operation for Parallelizable Message Authentication | p. 384 |
Invited Talk | |
Rethinking PKI: What's Trust Got to Do with It? | p. 398 |
Digital Signatures II | |
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods | p. 400 |
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security | p. 418 |
Security Notions for Unconditionally Secure Signature Schemes | p. 434 |
Traitor Tracking & Id-Based Encryption | |
Traitor Tracing with Constant Transmission Rate | p. 450 |
Toward Hierarchical Identity-Based Encryption | p. 466 |
Multiparty and Multicast | |
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch | p. 482 |
Perfectly Secure Message Transmission Revisited | p. 502 |
Symmetric Cryptology | |
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis | p. 518 |
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS | p. 534 |
Author Index | p. 547 |