Advances in Cryptology — ASIACRYPT 2002

8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings

  • Yuliang Zheng
Conference proceedings ASIACRYPT 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2501)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer
    Pages 1-26
  3. Wieb Bosma, James Hutton, Eric R. Verheul
    Pages 46-63
  4. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
    Pages 81-99
  5. Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu
    Pages 110-124
  6. Dowon Hong, Ku-Young Chang, Heuisu Ryu
    Pages 143-159
  7. Elad Barkan, Eli Biham
    Pages 160-175
  8. Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim
    Pages 176-191
  9. Jonathan Katz, Moti Yung
    Pages 192-205
  10. Masayuki Abe, Ronald Cramer, Serge Fehr
    Pages 206-224
  11. K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan
    Pages 224-242
  12. Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung
    Pages 243-253
  13. Eli Biham, Orr Dunkelman, Nathan Keller
    Pages 254-266
  14. Nicolas T. Courtois, Josef Pieprzyk
    Pages 267-287
  15. Alexander Klimov, Anton Mityagin, Adi Shamir
    Pages 288-298
  16. Dario Catalano, Phong Q. Nguyen, Jacques Stern
    Pages 299-310
  17. Paolo D’Arco, Douglas R. Stinson
    Pages 346-363
  18. Louis Granboulan
    Pages 364-378
  19. Mihir Bellare, Gregory Neven
    Pages 397-414
  20. Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki
    Pages 415-432
  21. Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels
    Pages 451-465
  22. Kishan Chand Gupta, Palash Sarkar
    Pages 466-483
  23. Claude Carlet, Aline Gouget
    Pages 484-496
  24. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Pages 497-514
  25. Fangguo Zhang, Kwangjo Kim
    Pages 533-547
  26. Craig Gentry, Alice Silverberg
    Pages 548-566
  27. Moti Yung
    Pages 567-573
  28. Back Matter
    Pages 577-578

About these proceedings


This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.


Authentication Boolean function Cryptanalysis Cryptographic Attacks Cryptology Cryptosystems Digital Signature Systems Key Exchange Protocols Public Key Cryptography Secure Multiparty Computation cryptography data security information security

Editors and affiliations

  • Yuliang Zheng
    • 1
  1. 1.Department of Software and Information SystemsUniversity of North Carolina at CharlotteCharlotteUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-00171-3
  • Online ISBN 978-3-540-36178-7
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site