Advances in Cryptology — ASIACRYPT 2001

7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings

  • Colin Boyd

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2248)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Lattice Based Cryptography

    1. Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo
      Pages 1-20
    2. Phong Q. Nguyen, Igor E. Shparlinski
      Pages 21-35
    3. Dan Boneh, Shai Halevi, Nick Howgrave-Graham
      Pages 36-51
  3. Human Identification

    1. Nicholas J. Hopper, Manuel Blum
      Pages 52-66
  4. Invited Talk

  5. Practical Public Key Cryptography

    1. Martijn Stam, Arjen K. Lenstra
      Pages 125-143
    2. Jae Choon Cha, Ki Hyoung Ko, Sang Jin Lee, Jae Woo Han, Jung Hee Cheon
      Pages 144-156
  6. Cryptography Based on Coding Theory

    1. Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier
      Pages 157-174
    2. Alice Silverberg, Jessica Staddon, Judy L. Walker
      Pages 175-192
  7. Block Ciphers

    1. Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim et al.
      Pages 208-221
    2. Jacques Patarin
      Pages 222-238
    3. Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji Munetoh
      Pages 239-254
  8. Provable Security

    1. Ju-Sung Kang, Sang-Uk Shin, Dowon Hong, Okyeon Yi
      Pages 255-271
    2. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
      Pages 290-309
  9. Threshold Cryptography

    1. Pierre-Alain Fouque, Jacques Stern
      Pages 310-330

About these proceedings

Introduction

The origins of the Asiacrypt series of conferences can be traced back to 1990, when the ?rst Auscrypt conference was held, although the name Asiacrypt was ?rst used for the 1991 conference in Japan. Starting with Asiacrypt 2000, the conference is now one of three annual conferences organized by the Inter- tional Association for Cryptologic Research (IACR). The continuing success of Asiacrypt is in no small part due to the e?orts of the Asiacrypt Steering C- mittee (ASC) and the strong support of the IACR Board of Directors. There were 153 papers submitted to Asiacrypt 2001 and 33 of these were accepted for inclusion in these proceedings. The authors of every paper, whether accepted or not, made a valued contribution to the success of the conference. Sending out rejection noti?cations to so many hard working authors is one of the most unpleasant tasks of the Program Chair. The review process lasted some 10 weeks and consisted of an initial refe- eing phase followed by an extensive discussion period. My heartfelt thanks go to all members of the Program Committee who put in extreme amounts of time to give their expert analysis and opinions on the submissions. All papers were reviewed by at least three committee members; in many cases, particularly for those papers submitted by committee members, additional reviews were obt- ned. Specialist reviews were provided by an army of external reviewers without whom our decisions would have been much more di?cult.

Keywords

Authentication Computational Algebra Cryptoanalysis Cryptography Cryptology Cryptosystems Information Information Security Public Key Cryptography Signatur coding theory complexity digital privacy security

Editors and affiliations

  • Colin Boyd
    • 1
  1. 1.School of Data Communications Information Security Research CentreQueensland University of TechnologyBrisbaneAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-45682-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-42987-6
  • Online ISBN 978-3-540-45682-7
  • Series Print ISSN 0302-9743
  • About this book