Topics in Cryptology — CT-RSA 2001

The Cryptographers’ Track at RSA Conference 2001 San Francisco, CA, USA, April 8–12, 2001 Proceedings

  • David Naccache

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2020)

Table of contents

  1. Front Matter
    Pages I-XII
  2. New Cryptosystems

    1. Iris Anshel, Michael Anshel, Benji Fisher, Dorian Goldfeld
      Pages 13-27
  3. RSA

  4. Symmetric Cryptography

  5. Gambling and Lotteries

    1. Eyal Kushilevitz, Tal Rabin
      Pages 100-109
    2. Markus Jakobsson, David Pointcheval, Adam Young
      Pages 110-125
  6. Reductions, Constructions and Security Proofs

    1. Daniel R. L. Brown, Don B. Johnson
      Pages 126-142
    2. Michel Abdalla, Mihir Bellare, Phillip Rogaway
      Pages 143-158
    3. Tatsuaki Okamoto, David Pointcheval
      Pages 159-174
  7. Flaws and Attacks

    1. Markus Jakobsson, Susanne Wetzel
      Pages 176-191
    2. Colin D. Walter, Susan Thompson
      Pages 192-207
    3. Marc Joye, Jean-Jacques Quisquater, Moti Yung
      Pages 208-222
  8. Implementation

    1. Alexander Tiountchik, Elena Trichina
      Pages 223-234
    2. Michael Brown, Darrel Hankerson, Julio López, Alfred Menezes
      Pages 250-265

About these proceedings

Introduction

You are holding the rst in a hopefully long and successful series of RSA Cr- tographers’ Track proceedings. The Cryptographers’ Track (CT-RSA) is one of the many parallel tracks of the yearly RSA Conference. Other sessions deal with government projects, law and policy issues, freedom and privacy news, analysts’ opinions, standards, ASPs, biotech and healthcare, nance, telecom and wireless security, developers, new products, implementers, threats, RSA products, VPNs, as well as cryp- graphy and enterprise tutorials. RSA Conference 2001 is expected to continue the tradition and remain the largest computer security event ever staged: 250 vendors, 10,000 visitors and 3,000 class-going attendees are expected in San Francisco next year. I am very grateful to the 22 members of the program committee for their hard work. The program committee received 65 submissions (one of which was later withdrawn) for which review was conducted electronically; almost all papers had at least two reviews although most had three or more. Eventually, we accepted the 33 papers that appear in these proceedings. Revisions were not checked on their scienti c aspects and some authors will write nal versions of their papers for publication in refereed journals. As is usual, authors bear full scienti c and paternity responsibilities for the contents of their papers.

Keywords

Access Control Authentication Bluetooth Computational Number Theory Cryptoanalysis Cryptographic Protocools Cryptography DES Data Security Information Security RSA Signatur algorithms calculus cryptology

Editors and affiliations

  • David Naccache
    • 1
  1. 1.Gemplus Card InternationalIssy les MoulineauxFrance

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-45353-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-41898-6
  • Online ISBN 978-3-540-45353-6
  • Series Print ISSN 0302-9743
  • About this book