© 2002

Advances in Cryptology — CRYPTO 2002

22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18–22, 2002 Proceedings

  • Moti Yung
Conference proceedings CRYPTO 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2442)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Block Ciphers

    1. Sean Murphy, Matthew J.B. Robshaw
      Pages 1-16
    2. Moses Liskov, Ronald L. Rivest, David Wagner
      Pages 31-46
  3. Multi-user Oriented Cryptosystems

    1. Dani Halevy, Adi Shamir
      Pages 47-60
  4. Foundations and Methodology

    1. Nicholas J. Hopper, John Langford, Luis von Ahn
      Pages 77-92
    2. Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart
      Pages 93-110
  5. Security of Practical Protocols

  6. Secure Multiparty Computation

    1. Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
      Pages 178-193
    2. Markus Bläser, Andreas Jakoby, Maciej Liśkiewicz, Bodo Siebert
      Pages 194-209
  7. Public-Key Encryption

    1. Phong Q. Nguyen, David Pointcheval
      Pages 210-225
    2. Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier
      Pages 226-241
  8. Information Theory and Secret Sharing

  9. Cipher Design and Analysis

    1. David Wagner
      Pages 288-304

About these proceedings


Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. It is published as Vol. 2442 of the Lecture Notes in Computer Science (LNCS) of Springer Verlag. Note that 2002, 22 and 2442 are all palindromes... (Don’t nod!) Theconferencereceived175submissions,ofwhich40wereaccepted;twos- missionsweremergedintoasinglepaper,yieldingthetotalof39papersaccepted for presentation in the technical program of the conference. In this proceedings volume you will ?nd the revised versions of the 39 papers that were presented at the conference. The submissions represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. In fact, many high-quality works (that surely will be published elsewhere) could not be accepted. This is due to the competitive nature of the conference and the challenging task of selecting a program. I wish to thank the authors of all submitted papers. Indeed, it is the authors of all papers who have made this conference possible, regardless of whether or not their papers were accepted. The conference program was also immensely bene?ted by two plenary talks.


Boolean function Cryptography algorithmic number theory authentication cryptoanalysis cryptographic protocolls data encryption digital signatures finite field computations information information theory multi-party computation public key cryptography security

Editors and affiliations

  • Moti Yung
    • 1
  1. 1.Department of Computer ScienceColumbia UniversityNewYorkUSA

Bibliographic information