Advances in Cryptology — CRYPTO 2001

21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001 Proceedings

Editors:

ISBN: 978-3-540-42456-7 (Print) 978-3-540-44647-7 (Online)
Download Book (5,559 KB) As a courtesy to our readers the eBook is provided DRM-free. However, please note that Springer uses effective methods and state-of-the art technology to detect, stop, and prosecute illegal sharing to safeguard our authors’ interests.

Table of contents (33 chapters)

previous Page of 2
  1. Foundations

    1. Book Chapter

      Pages 1-18

      On the (Im)possibility of Obfuscating Programs

    2. Book Chapter

      Pages 19-40

      Universally Composable Commitments

  2. Traitor Tracing

    1. Book Chapter

      Pages 41-62

      Revocation and Tracing Schemes for Stateless Receivers

    2. Book Chapter

      Pages 63-79

      Self Protecting Pirates and Black-Box Traitor Tracing

  3. Multi-party Computation

    1. Book Chapter

      Pages 80-100

      Minimal Complete Primitives for Secure Multi-party Computation

    2. Book Chapter

      Pages 101-118

      Robustness for Free in Unconditional Multi-party Computation

    3. Book Chapter

      Pages 119-136

      Secure Distributed Linear Algebra in a Constant Number of Rounds

  4. Two-Party Computation

    1. Book Chapter

      Pages 137-154

      Two-Party Generation of DSA Signatures

    2. Book Chapter

      Pages 155-170

      Oblivious Transfer in the Bounded Storage Model

    3. Book Chapter

      Pages 171-189

      Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation

  5. Elliptic Curves

    1. Book Chapter

      Pages 190-200

      Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms

    2. Book Chapter

      Pages 201-212

      On the Unpredictability of Bits of the Elliptic Curve Diffie-Hellman Scheme

    3. Book Chapter

      Pages 213-229

      Identity-Based Encryption from the Weil Pairing

  6. OAEP

    1. Book Chapter

      Pages 230-238

      A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0

    2. Book Chapter

      Pages 239-259

      OAEP Reconsidered

    3. Book Chapter

      Pages 260-274

      RSA-OAEP Is Secure under the RSA Assumption

    4. Book Chapter

      Pages 275-291

      Simplified OAEP for the RSA and Rabin Functions

  7. Encryption and Authentication

    1. Book Chapter

      Pages 292-309

      Online Ciphers and the Hash-CBC Construction

    2. Book Chapter

      Pages 310-331

      The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)

  8. Signature Schemes

    1. Book Chapter

      Pages 332-354

      Forward-Secure Signatures with Optimal Signing and Verifying

previous Page of 2