Advances in Cryptology — EUROCRYPT 2002

International Conference on the Theory and Applications of Cryptographic Techniques Amsterdam, The Netherlands, April 28 – May 2, 2002 Proceedings

Editors:

ISBN: 978-3-540-43553-2 (Print) 978-3-540-46035-0 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Cryptanalysis I

    1. Book Chapter

      Pages 1-13

      Cryptanalysis of a Pseudorandom Generator Based on Braid Groups

    2. Book Chapter

      Pages 14-28

      Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups

    3. Book Chapter

      Pages 29-44

      Extending the GHS Weil Descent Attack

  2. Public-Key Encryption

    1. Book Chapter

      Pages 45-64

      Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption

    2. Book Chapter

      Pages 65-82

      Key-Insulated Public Key Cryptosystems

    3. Book Chapter

      Pages 83-107

      On the Security of Joint Signature and Encryption

  3. Invited Talk

    1. Book Chapter

      Pages 108-109

      AES and the Wide Trail Design Strategy

  4. Information Theory & New Models

    1. Book Chapter

      Pages 110-132

      Indistinguishability of Random Systems

    2. Book Chapter

      Pages 133-148

      How to Fool an Unbounded Adversary with a Short Key

    3. Book Chapter

      Pages 149-164

      Cryptography in an Unbounded Computational Model

  5. Implementational Analysis

    1. Book Chapter

      Pages 165-180

      Performance Analysis and Parallel Implementation of Dedicated Hash Functions

    2. Book Chapter

      Pages 181-196

      Fault Injection and a Timing Channel on an Analysis Technique

    3. Book Chapter

      Pages 197-208

      Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms

  6. Stream Ciphers

    1. Book Chapter

      Pages 209-221

      Fast Correlation Attacks: An Algorithmic Point of View

    2. Book Chapter

      Pages 222-237

      BDD-Based Cryptanalysis of Keystream Generators

    3. Book Chapter

      Pages 238-255

      Linear Cryptanalysis of Bluetooth Stream Cipher

  7. Digital Signatures I

    1. Book Chapter

      Pages 256-271

      Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups

    2. Book Chapter

      Pages 272-287

      Optimal Security Proofs for PSS and Other Signature Schemes

  8. Cryptanalysis II

    1. Book Chapter

      Pages 288-298

      Cryptanalysis of SFLASH

    2. Book Chapter

      Pages 299-320

      Cryptanalysis of the Revised NTRU Signature Scheme

previous Page of 2