EUROCRYPT A*

36 papers

YearTitle / Authors
2002A Block-Cipher Mode of Operation for Parallelizable Message Authentication.
John Black, Phillip Rogaway
2002A Practice-Oriented Treatment of Pseudorandom Number Generators.
Anand Desai, Alejandro Hevia, Yiqun Lisa Yin
2002AES and the Wide Trail Design Strategy.
Joan Daemen, Vincent Rijmen
2002Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings
Lars R. Knudsen
2002BDD-Based Cryptanalysis of Keystream Generators.
Matthias Krause
2002Cryptanalysis of SFLASH.
Henri Gilbert, Marine Minier
2002Cryptanalysis of a Pseudorandom Generator Based on Braid Groups.
Rosario Gennaro, Daniele Micciancio
2002Cryptanalysis of the Revised NTRU Signature Scheme.
Craig Gentry, Michael Szydlo
2002Cryptography in an Unbounded Computational Model.
David P. Woodruff, Marten van Dijk
2002Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis.
Anne Canteaut, Marion Videau
2002Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions.
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
2002Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods.
Tal Malkin, Daniele Micciancio, Sara K. Miner
2002Extending the GHS Weil Descent Attack.
Steven D. Galbraith, Florian Hess, Nigel P. Smart
2002Fast Correlation Attacks: An Algorithmic Point of View.
Philippe Chose, Antoine Joux, Michel Mitton
2002Fault Injection and a Timing Channel on an Analysis Technique.
John A. Clark, Jeremy L. Jacob
2002From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre
2002Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups.
Ivan Damgård, Maciej Koprowski
2002How to Fool an Unbounded Adversary with a Short Key.
Alexander Russell, Hong Wang
2002Indistinguishability of Random Systems.
Ueli M. Maurer
2002Key-Insulated Public Key Cryptosystems.
Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
2002Linear Cryptanalysis of Bluetooth Stream Cipher.
Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari
2002On Deniability in Quantum Key Exchange.
Donald Beaver
2002On the Security of Joint Signature and Encryption.
Jee Hea An, Yevgeniy Dodis, Tal Rabin
2002Optimal Security Proofs for PSS and Other Signature Schemes.
Jean-Sébastien Coron
2002Perfectly Secure Message Transmission Revisited.
Yvo Desmedt, Yongge Wang
2002Performance Analysis and Parallel Implementation of Dedicated Hash Functions.
Junko Nakajima, Mitsuru Matsui
2002Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups.
Sangjin Lee, Eonkyung Lee
2002Rethinking PKI: What's Trust Got to Do with It?
Stephen T. Kent
2002Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS ....
Serge Vaudenay
2002Security Notions for Unconditionally Secure Signature Schemes.
Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
2002Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms.
Young-Ho Park, Sangtae Jeong, Jongin Lim
2002Toward Hierarchical Identity-Based Encryption.
Jeremy Horwitz, Ben Lynn
2002Traitor Tracing with Constant Transmission Rate.
Aggelos Kiayias, Moti Yung
2002Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch.
Matthias Fitzi, Nicolas Gisin, Ueli M. Maurer, Oliver von Rotz
2002Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption.
Ronald Cramer, Victor Shoup
2002Universally Composable Notions of Key Exchange and Secure Channels.
Ran Canetti, Hugo Krawczyk