Advances in Cryptology — CRYPTO 2001

21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001 Proceedings

Editors:

ISBN: 978-3-540-42456-7 (Print) 978-3-540-44647-7 (Online)

Table of contents (33 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XI

  2. Foundations

    1. Book Chapter

      Pages 1-18

      On the (Im)possibility of Obfuscating Programs

    2. Book Chapter

      Pages 19-40

      Universally Composable Commitments

  3. Traitor Tracing

    1. Book Chapter

      Pages 41-62

      Revocation and Tracing Schemes for Stateless Receivers

    2. Book Chapter

      Pages 63-79

      Self Protecting Pirates and Black-Box Traitor Tracing

  4. Multi-party Computation

    1. Book Chapter

      Pages 80-100

      Minimal Complete Primitives for Secure Multi-party Computation

    2. Book Chapter

      Pages 101-118

      Robustness for Free in Unconditional Multi-party Computation

    3. Book Chapter

      Pages 119-136

      Secure Distributed Linear Algebra in a Constant Number of Rounds

  5. Two-Party Computation

    1. Book Chapter

      Pages 137-154

      Two-Party Generation of DSA Signatures

    2. Book Chapter

      Pages 155-170

      Oblivious Transfer in the Bounded Storage Model

    3. Book Chapter

      Pages 171-189

      Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation

  6. Elliptic Curves

    1. Book Chapter

      Pages 190-200

      Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms

    2. Book Chapter

      Pages 201-212

      On the Unpredictability of Bits of the Elliptic Curve Diffie-Hellman Scheme

    3. Book Chapter

      Pages 213-229

      Identity-Based Encryption from the Weil Pairing

  7. OAEP

    1. Book Chapter

      Pages 230-238

      A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0

    2. Book Chapter

      Pages 239-259

      OAEP Reconsidered

    3. Book Chapter

      Pages 260-274

      RSA-OAEP Is Secure under the RSA Assumption

    4. Book Chapter

      Pages 275-291

      Simplified OAEP for the RSA and Rabin Functions

  8. Encryption and Authentication

    1. Book Chapter

      Pages 292-309

      Online Ciphers and the Hash-CBC Construction

    2. Book Chapter

      Pages 310-331

      The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)

  9. Signature Schemes

    1. Book Chapter

      Pages 332-354

      Forward-Secure Signatures with Optimal Signing and Verifying

previous Page of 2