Advances in Cryptology — ASIACRYPT 2002

8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings

  • Yuliang Zheng
Conference proceedings ASIACRYPT 2002

DOI: 10.1007/3-540-36178-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2501)

Table of contents (36 papers)

  1. Front Matter
    Pages I-XIII
  2. Analysis of Bernstein’s Factorization Circuit
    Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer
    Pages 1-26
  3. Looking beyond XTR
    Wieb Bosma, James Hutton, Eric R. Verheul
    Pages 46-63
  4. Unconditionally Secure Anonymous Encryption and Group Authentication
    Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
    Pages 81-99
  5. On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives
    Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu
    Pages 110-124
  6. Efficient Oblivious Transfer in the Bounded-Storage Model
    Dowon Hong, Ku-Young Chang, Heuisu Ryu
    Pages 143-159
  7. In How Many Ways Can You Write Rijndael?
    Elad Barkan, Eli Biham
    Pages 160-175
  8. On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis
    Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim
    Pages 176-191
  9. Threshold Cryptosystems Based on Factoring
    Jonathan Katz, Moti Yung
    Pages 192-205
  10. Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
    Masayuki Abe, Ronald Cramer, Serge Fehr
    Pages 206-224
  11. Asynchronous Secure Communication Tolerating Mixed Adversaries
    K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan
    Pages 224-242
  12. Amplified Boomerang Attack against Reduced-Round SHACAL
    Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung
    Pages 243-253
  13. Enhancing Differential-Linear Cryptanalysis
    Eli Biham, Orr Dunkelman, Nathan Keller
    Pages 254-266
  14. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
    Nicolas T. Courtois, Josef Pieprzyk
    Pages 267-287
  15. Analysis of Neural Cryptography
    Alexander Klimov, Anton Mityagin, Adi Shamir
    Pages 288-298
  16. The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm
    Dario Catalano, Phong Q. Nguyen, Jacques Stern
    Pages 299-310

About these proceedings


This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.


Authentication Boolean function Cryptanalysis Cryptographic Attacks Cryptology Cryptosystems Digital Signature Systems Key Exchange Protocols Public Key Cryptography Secure Multiparty Computation cryptography data security information security

Editors and affiliations

  • Yuliang Zheng
    • 1
  1. 1.Department of Software and Information SystemsUniversity of North Carolina at CharlotteCharlotteUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-00171-3
  • Online ISBN 978-3-540-36178-7
  • Series Print ISSN 0302-9743