Conferences in DBLP
Sean Murphy , Matthew J. B. Robshaw Essential Algebraic Structure within the AES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:1-16 [Conf ] Antoine Joux , Gwenaëlle Martinet , Frédéric Valette Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:17-30 [Conf ] Moses Liskov , Ronald L. Rivest , David Wagner Tweakable Block Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:31-46 [Conf ] Dani Halevy , Adi Shamir The LSD Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:47-60 [Conf ] Jan Camenisch , Anna Lysyanskaya Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:61-76 [Conf ] Nicholas J. Hopper , John Langford , Luis von Ahn Provably Secure Steganography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:77-92 [Conf ] Jacques Stern , David Pointcheval , John Malone-Lee , Nigel P. Smart Flaws in Applying Proof Methodologies to Signature Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:93-110 [Conf ] Jesper Buus Nielsen Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:111-126 [Conf ] Jakob Jonsson , Burton S. Kaliski Jr. On the Security of RSA Encryption in TLS. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:127-142 [Conf ] Ran Canetti , Hugo Krawczyk Security Analysis of IKE's Signature-Based Key-Exchange Protocol. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:143-161 [Conf ] Mihir Bellare , Adriana Palacio GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:162-177 [Conf ] Rosario Gennaro , Yuval Ishai , Eyal Kushilevitz , Tal Rabin On 2-Round Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:178-193 [Conf ] Markus Bläser , Andreas Jakoby , Maciej Liskiewicz , Bodo Siebert Private Computation - k-Connected versus 1-Connected Networks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:194-209 [Conf ] Phong Q. Nguyen , David Pointcheval Analysis and Improvements of NTRU Encryption Paddings. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:210-225 [Conf ] Jean-Sébastien Coron , Marc Joye , David Naccache , Pascal Paillier Universal Padding Schemes for RSA. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:226-241 [Conf ] Alexander May Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:242-256 [Conf ] Chi-Jen Lu Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:257-271 [Conf ] Ronald Cramer , Serge Fehr Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:272-287 [Conf ] David Wagner A Generalized Birthday Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:288-303 [Conf ] Ilya Mironov (Not So) Random Shuffles of RC4. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:304-319 [Conf ] John Black , Phillip Rogaway , Thomas Shrimpton Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:320-335 [Conf ] Karl Rubin , Alice Silverberg Supersingular Abelian Varieties in Cryptology. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:336-353 [Conf ] Paulo S. L. M. Barreto , Hae Yong Kim , Ben Lynn , Michael Scott Efficient Algorithms for Pairing-Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:354-368 [Conf ] Frederik Vercauteren Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:369-384 [Conf ] Philip D. MacKenzie , Thomas Shrimpton , Markus Jakobsson Threshold Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:385-400 [Conf ] Jesper Buus Nielsen A Threshold Pseudorandom Function Construction and Its Applications. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:401-416 [Conf ] Joy Algesheimer , Jan Camenisch , Victor Shoup Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:417-432 [Conf ] Wen-Ching W. Li , Mats Näslund , Igor Shparlinski Hidden Number Problem with the Trace and Bit Security of XTR and LUC. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:433-448 [Conf ] Ivan Damgård , Jesper Buus Nielsen Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:449-464 [Conf ] Emmanuel Bresson , Jacques Stern , Michael Szydlo Threshold Ring Signatures and Applications to Ad-hoc Groups. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:465-480 [Conf ] Moni Naor Deniable Ring Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:481-498 [Conf ] Gene Itkis , Leonid Reyzin SiBIR: Signer-Base Intrusion-Resilient Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:499-514 [Conf ] Don Coppersmith , Shai Halevi , Charanjit S. Jutla Cryptanalysis of Stream Ciphers with Linear Masking. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:515-532 [Conf ] Palash Sarkar The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:533-548 [Conf ] Claude Carlet A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:549-564 [Conf ] Serge Fehr , Ueli M. Maurer Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:565-580 [Conf ] Ivan Damgård , Jesper Buus Nielsen Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:581-596 [Conf ] Anna Lysyanskaya Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:597-612 [Conf ] Jean-Sébastien Coron Security Proof for Partial-Domain Hash Signature Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:613-626 [Conf ]