ASIACRYPT A

37 papers

YearTitle / Authors
20021-out-of-n Signatures from a Variety of Keys.
Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki
2002A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2.
Pierrick Gaudry
2002A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme.
Hiroki Koga
2002A Revocation Scheme with Minimal Storage at Receivers.
Tomoyuki Asano
2002A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order.
Ivan Damgård, Eiichiro Fujisaki
2002A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order.
Stefan Lucks
2002Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model.
Alexander W. Dent
2002Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings
Yuliang Zheng
2002Amplified Boomerang Attack against Reduced-Round SHACAL.
Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seok Won Jung
2002An Upper Bound on the Number of m-Resilient Boolean Functions.
Claude Carlet, Aline Gouget
2002Analysis of Bernstein's Factorization Circuit.
Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer
2002Analysis of Neural Cryptography.
Alexander Klimov, Anton Mityagin, Adi Shamir
2002Asynchronous Secure Communication Tolerating Mixed Adversaries.
K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan
2002Bounds for Robust Metering Schemes and Their Relationship with A-code.
Wakaha Ogata, Kaoru Kurosawa
2002Cryptanalysis of Block Ciphers with Overdefined Systems of Equations.
Nicolas T. Courtois, Josef Pieprzyk
2002Crypto-integrity.
Moti Yung
2002Efficient Oblivious Transfer in the Bounded-Storage Model.
Dowon Hong, Ku-Young Chang, Heuisu Ryu
2002Enhancing Differential-Linear Cryptanalysis.
Eli Biham, Orr Dunkelman, Nathan Keller
2002Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks.
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
2002Gummy and Conductive Silicone Rubber Fingers.
Tsutomu Matsumoto
2002Hierarchical ID-Based Cryptography.
Craig Gentry, Alice Silverberg
2002ID-Based Blind Signature and Ring Signature from Pairings.
Fangguo Zhang, Kwangjo Kim
2002Improved Construction of Nonlinear Resilient S-Boxes.
Kishan Chand Gupta, Palash Sarkar
2002In How Many Ways Can You Write Rijndael?
Elad Barkan, Eli Biham
2002Looking beyond XTR.
Wieb Bosma, James Hutton, Eric R. Verheul
2002Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments.
Masayuki Abe, Ronald Cramer, Serge Fehr
2002On Unconditionally Secure Robust Distributed Key Distribution Centers.
Paolo D'Arco, Douglas R. Stinson
2002On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives.
Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu
2002On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis.
Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim
2002Optimistic Mixing for Exit-Polls.
Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels
2002Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization.
Chanathip Namprempre
2002Short Signatures in the Random Oracle Model.
Louis Granboulan
2002The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm.
Dario Catalano, Phong Q. Nguyen, Jacques Stern
2002The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes.
Alejandro Hevia, Daniele Micciancio
2002Threshold Cryptosystems Based on Factoring.
Jonathan Katz, Moti Yung
2002Transitive Signatures Based on Factoring and RSA.
Mihir Bellare, Gregory Neven
2002Unconditionally Secure Anonymous Encryption and Group Authentication.
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai