Skip to main content
Book cover

Advances in Cryptology - CRYPTO 2002

22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings

  • Conference proceedings
  • © 2002

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2442)

Included in the following conference series:

Conference proceedings info: CRYPTO 2002.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (39 papers)

  1. Block Ciphers

  2. Multi-user Oriented Cryptosystems

  3. Foundations and Methodology

  4. Security of Practical Protocols

  5. Secure Multiparty Computation

  6. Public-Key Encryption

  7. Information Theory and Secret Sharing

  8. Cipher Design and Analysis

Other volumes

  1. Advances in Cryptology — CRYPTO 2002

Keywords

About this book

Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. It is published as Vol. 2442 of the Lecture Notes in Computer Science (LNCS) of Springer Verlag. Note that 2002, 22 and 2442 are all palindromes... (Don’t nod!) Theconferencereceived175submissions,ofwhich40wereaccepted;twos- missionsweremergedintoasinglepaper,yieldingthetotalof39papersaccepted for presentation in the technical program of the conference. In this proceedings volume you will ?nd the revised versions of the 39 papers that were presented at the conference. The submissions represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. In fact, many high-quality works (that surely will be published elsewhere) could not be accepted. This is due to the competitive nature of the conference and the challenging task of selecting a program. I wish to thank the authors of all submitted papers. Indeed, it is the authors of all papers who have made this conference possible, regardless of whether or not their papers were accepted. The conference program was also immensely bene?ted by two plenary talks.

Editors and Affiliations

  • Department of Computer Science, Columbia University, NewYork, USA

    Moti Yung

Bibliographic Information

Publish with us