Advances in Cryptology - EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings (Google eBook)
Springer, Apr 17, 2002 - Business & Economics - 545 pages
This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2002, held in Amsterdam, The Netherlands, in April/May 2002.
The 33 revised full papers presented were carefully reviewed and selected from a total of 122 submissions. The papers are organized in topical sections on cryptanalysis, public-key encryption, information theory and new models, implementational analysis, stream ciphers, digital signatures, key exchange, modes of operation, traitor tracing and id-based encryption, multiparty and multicast, and symmetric cryptology.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International ...
Limited preview - 2005
Advances in Cryptology -- EUROCRYPT 2003: International Conference on the ...
Limited preview - 2003
Extending the GHS Weil Descent Attack
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure PublicKey Encryption
KeyInsulated Public Key Cryptosystems
On the Security of Joint Signature and Encryption
AES and the Wide Trail Design Strategy
Indistinguishability of Random Systems
Cryptanalysis of the Revised NTRU Signature Scheme
Dynamic Group DiffieHellman Key Exchange under Standard Assumptions
Universally Composable Notions of Key Exchange and Secure Channels
On Deniability in Quantum Key Exchange
A PracticeOriented Treatment of Pseudorandom Number Generators
A BlockCipher Mode of Operation for Parallelizable Message Authentication
Whats Trust Got to Do with It?
Efficient Generic ForwardSecure Signatures with an Unbounded Number of Time Periods
How to Fool an Unbounded Adversary with a Short Key
Cryptography in an Unbounded Computational Model
Performance Analysis and Parallel Implementation of Dedicated Hash Functions
Fault Injection and a Timing Channel on an Analysis Technique
Speeding Up Point Multiplication on Hyperelliptic Curves with EfficientlyComputable Endomorphisms
An Algorithmic Point of View
BDDBased Cryptanalysis of Keystream Generators
Linear Cryptanalysis of Bluetooth Stream Cipher
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups
Optimal Security Proofs for PSS and Other Signature Schemes
Cryptanalysis of SFLASH
Minimizing Assumptions for Security and ForwardSecurity
Security Notions for Unconditionally Secure Signature Schemes
Traitor Tracing with Constant Transmission Rate
Toward Hierarchical IdentityBased Encryption
Unconditional Byzantine Agreement and Multiparty Computation Secure against Dishonest Minorities from Scratch
Perfectly Secure Message Transmission Revisited
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis
Security Flaws Induced by CBC Padding Applications to SSL IPSEC WTLS
Other editions - View all
Advances in Cryptology - EUROCRYPT 2002: International Conference on the ...
Limited preview - 2002
Advances in Cryptology--EUROCRYPT 2002: International Conference on the ...
No preview available - 2002
Advances in Cryptology adversary algorithm apply assume assumption authentication Bellare block cipher braid groups chosen ciphertext coefficients complexity Computer Science consider construction correlation corresponding cryptanalysis CRYPTO cryptographic decryption defined Definition denote Diffie-Hellman digital signature distribution efficient elements elliptic curves encryption scheme equations EUROCRYPT FBDDs finite forger forward-secure given hash functions hyperelliptic curves identification scheme initial input integer isogeny key exchange keystream lattice Lecture Notes Lemma length LFSR linear LNCS matrix method node Notes in Computer obtain permutation plaintext players polynomial prime private key PRNG probability problem projective hash family protocol pseudorandom public key random oracle model random system real numbers secret key Section secure channels security notion security parameter security proof semantic security sequence signature scheme signcryption simulator Springer Springer-Verlag stream ciphers string Theorem tion traitor tracing update vector verifier