© 2001

Advances in Cryptology — CRYPTO 2001

21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001 Proceedings

  • Joe Kilian
Conference proceedings CRYPTO 2001

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2139)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Foundations

    1. Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan et al.
      Pages 1-18
    2. Ran Canetti, Marc Fischlin
      Pages 19-40
  3. Traitor Tracing

    1. Dalit Naor, Moni Naor, Jeff Lotspiech
      Pages 41-62
    2. Aggelos Kiayias, Moti Yung
      Pages 63-79
  4. Multi-party Computation

    1. Matthias Fitzi, Juan A. Garay, Ueli Maurer, Rafail Ostrovsky
      Pages 80-100
    2. Martin Hirt, Ueli Maurer
      Pages 101-118
    3. Ronald Cramer, Ivan Damgård
      Pages 119-136
  5. Two-Party Computation

    1. Philip MacKenzie, Michael K. Reiter
      Pages 137-154
  6. Elliptic Curves

    1. Robert P. Gallant, Robert J. Lambert, Scott A. Vanstone
      Pages 190-200
    2. Dan Boneh, Matt Franklin
      Pages 213-229
  7. OAEP

    1. Victor Shoup
      Pages 239-259
    2. Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
      Pages 260-274
  8. Encryption and Authentication

    1. Mihir Bellare, Alexandra Boldyreva, Lars Knudsen, Chanathip Namprempre
      Pages 292-309

About these proceedings


Crypto 2001, the 21st Annual Crypto conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The conference received 156 submissions, of which the program committee selected 34 for presentation; one was later withdrawn. These proceedings contain the revised versions of the 33 submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program included two invited lectures. Mark Sherwin spoke on, \Quantum information processing in semiconductors: an experimentalist’s view." Daniel Weitzner spoke on, \Privacy, Authentication & Identity: A recent history of cryptographic struggles for freedom." The conference program also included its perennial \rump session," chaired by Stuart Haber, featuring short, informal talks on late{breaking research news. As I try to account for the hours of my life that ?ew o to oblivion, I realize that most of my time was spent cajoling talented innocents into spending even more time on my behalf. I have accumulated more debts than I can ever hope to repay. As mere statements of thanks are certainly insu cient, consider the rest of this preface my version of Chapter 11.


Algorithmic Number Theory Cryptanalysis Cryptographic Protocols Cryptography Data Encryption Digital Signatures Elliptic Curves Finite Field Computation Privacy Secure Networking Security Systems Security coding theory

Editors and affiliations

  • Joe Kilian
    • 1
  1. 1.Yianilos Labs.PrincetonUSA

Bibliographic information