Book Volume 2442 2002

Advances in Cryptology — CRYPTO 2002

22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18–22, 2002 Proceedings


ISBN: 978-3-540-44050-5 (Print) 978-3-540-45708-4 (Online)

Table of contents (39 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XIV

  2. Block Ciphers

    1. Chapter

      Pages 1-16

      Essential Algebraic Structure within the AES

    2. Chapter

      Pages 17-30

      Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC

    3. Chapter

      Pages 31-46

      Tweakable Block Ciphers

  3. Multi-user Oriented Cryptosystems

    1. Chapter

      Pages 47-60

      The LSD Broadcast Encryption Scheme

    2. Chapter

      Pages 61-76

      Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials

  4. Foundations and Methodology

    1. Chapter

      Pages 77-92

      Provably Secure Steganography

    2. Chapter

      Pages 93-110

      Flaws in Applying Proof Methodologies to Signature Schemes

    3. Chapter

      Pages 111-126

      Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case

  5. Security of Practical Protocols

    1. Chapter

      Pages 127-142

      On the Security of RSA Encryption in TLS

    2. Chapter

      Pages 143-161

      Security Analysis of IKE’s Signature-Based Key-Exchange Protocol

    3. Chapter

      Pages 162-177

      GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks

  6. Secure Multiparty Computation

    1. Chapter

      Pages 178-193

      On 2-Round Secure Multiparty Computation

    2. Chapter

      Pages 194-209

      Private Computation — k-Connected versus 1-Connected Networks

  7. Public-Key Encryption

    1. Chapter

      Pages 210-225

      Analysis and Improvements of NTRU Encryption Paddings

    2. Chapter

      Pages 226-241

      Universal Padding Schemes for RSA

    3. Chapter

      Pages 242-256

      Cryptanalysis of Unbalanced RSA with Small CRT-Exponent

  8. Information Theory and Secret Sharing

    1. Chapter

      Pages 257-271

      Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors

    2. Chapter

      Pages 272-287

      Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups

  9. Cipher Design and Analysis

    1. Chapter

      Pages 288-304

      A Generalized Birthday Problem

    2. Chapter

      Pages 304-319

      (Not So) Random Shuffles of RC4

previous Page of 2