| 2002 | A Block-Cipher Mode of Operation for Parallelizable Message Authentication. John Black, Phillip Rogaway |
| 2002 | A Practice-Oriented Treatment of Pseudorandom Number Generators. Anand Desai, Alejandro Hevia, Yiqun Lisa Yin |
| 2002 | AES and the Wide Trail Design Strategy. Joan Daemen, Vincent Rijmen |
| 2002 | Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings Lars R. Knudsen |
| 2002 | BDD-Based Cryptanalysis of Keystream Generators. Matthias Krause |
| 2002 | Cryptanalysis of SFLASH. Henri Gilbert, Marine Minier |
| 2002 | Cryptanalysis of a Pseudorandom Generator Based on Braid Groups. Rosario Gennaro, Daniele Micciancio |
| 2002 | Cryptanalysis of the Revised NTRU Signature Scheme. Craig Gentry, Michael Szydlo |
| 2002 | Cryptography in an Unbounded Computational Model. David P. Woodruff, Marten van Dijk |
| 2002 | Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. Anne Canteaut, Marion Videau |
| 2002 | Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
| 2002 | Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods. Tal Malkin, Daniele Micciancio, Sara K. Miner |
| 2002 | Extending the GHS Weil Descent Attack. Steven D. Galbraith, Florian Hess, Nigel P. Smart |
| 2002 | Fast Correlation Attacks: An Algorithmic Point of View. Philippe Chose, Antoine Joux, Michel Mitton |
| 2002 | Fault Injection and a Timing Channel on an Analysis Technique. John A. Clark, Jeremy L. Jacob |
| 2002 | From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre |
| 2002 | Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups. Ivan Damgård, Maciej Koprowski |
| 2002 | How to Fool an Unbounded Adversary with a Short Key. Alexander Russell, Hong Wang |
| 2002 | Indistinguishability of Random Systems. Ueli M. Maurer |
| 2002 | Key-Insulated Public Key Cryptosystems. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung |
| 2002 | Linear Cryptanalysis of Bluetooth Stream Cipher. Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari |
| 2002 | On Deniability in Quantum Key Exchange. Donald Beaver |
| 2002 | On the Security of Joint Signature and Encryption. Jee Hea An, Yevgeniy Dodis, Tal Rabin |
| 2002 | Optimal Security Proofs for PSS and Other Signature Schemes. Jean-Sébastien Coron |
| 2002 | Perfectly Secure Message Transmission Revisited. Yvo Desmedt, Yongge Wang |
| 2002 | Performance Analysis and Parallel Implementation of Dedicated Hash Functions. Junko Nakajima, Mitsuru Matsui |
| 2002 | Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups. Sangjin Lee, Eonkyung Lee |
| 2002 | Rethinking PKI: What's Trust Got to Do with It? Stephen T. Kent |
| 2002 | Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... Serge Vaudenay |
| 2002 | Security Notions for Unconditionally Secure Signature Schemes. Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai |
| 2002 | Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms. Young-Ho Park, Sangtae Jeong, Jongin Lim |
| 2002 | Toward Hierarchical Identity-Based Encryption. Jeremy Horwitz, Ben Lynn |
| 2002 | Traitor Tracing with Constant Transmission Rate. Aggelos Kiayias, Moti Yung |
| 2002 | Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch. Matthias Fitzi, Nicolas Gisin, Ueli M. Maurer, Oliver von Rotz |
| 2002 | Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. Ronald Cramer, Victor Shoup |
| 2002 | Universally Composable Notions of Key Exchange and Secure Channels. Ran Canetti, Hugo Krawczyk |