Advances in Cryptology — ASIACRYPT 2002

8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings


ISBN: 978-3-540-00171-3 (Print) 978-3-540-36178-7 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. Book Chapter

    Pages 1-26

    Analysis of Bernstein’s Factorization Circuit

  2. Book Chapter

    Pages 27-45

    A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order

  3. Book Chapter

    Pages 46-63

    Looking beyond XTR

  4. Book Chapter

    Pages 64-80

    Bounds for Robust Metering Schemes and Their Relationship with A 2 -code

  5. Book Chapter

    Pages 81-99

    Unconditionally Secure Anonymous Encryption and Group Authentication

  6. Book Chapter

    Pages 100-109

    Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model

  7. Book Chapter

    Pages 110-124

    On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives

  8. Book Chapter

    Pages 125-142

    A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order

  9. Book Chapter

    Pages 143-159

    Efficient Oblivious Transfer in the Bounded-Storage Model

  10. Book Chapter

    Pages 160-175

    In How Many Ways Can You Write Rijndael?

  11. Book Chapter

    Pages 176-191

    On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis

  12. Book Chapter

    Pages 192-205

    Threshold Cryptosystems Based on Factoring

  13. Book Chapter

    Pages 206-224

    Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments

  14. Book Chapter

    Pages 224-242

    Asynchronous Secure Communication Tolerating Mixed Adversaries

  15. Book Chapter

    Pages 243-253

    Amplified Boomerang Attack against Reduced-Round SHACAL

  16. Book Chapter

    Pages 254-266

    Enhancing Differential-Linear Cryptanalysis

  17. Book Chapter

    Pages 267-287

    Cryptanalysis of Block Ciphers with Overdefined Systems of Equations

  18. Book Chapter

    Pages 288-298

    Analysis of Neural Cryptography

  19. Book Chapter

    Pages 299-310

    The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm

  20. Book Chapter

    Pages 311-327

    A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2

previous Page of 2