The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
2002 (conf/crypto/2002)

  1. Sean Murphy, Matthew J. B. Robshaw
    Essential Algebraic Structure within the AES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:1-16 [Conf]
  2. Antoine Joux, Gwenaëlle Martinet, Frédéric Valette
    Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:17-30 [Conf]
  3. Moses Liskov, Ronald L. Rivest, David Wagner
    Tweakable Block Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:31-46 [Conf]
  4. Dani Halevy, Adi Shamir
    The LSD Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:47-60 [Conf]
  5. Jan Camenisch, Anna Lysyanskaya
    Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:61-76 [Conf]
  6. Nicholas J. Hopper, John Langford, Luis von Ahn
    Provably Secure Steganography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:77-92 [Conf]
  7. Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart
    Flaws in Applying Proof Methodologies to Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:93-110 [Conf]
  8. Jesper Buus Nielsen
    Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:111-126 [Conf]
  9. Jakob Jonsson, Burton S. Kaliski Jr.
    On the Security of RSA Encryption in TLS. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:127-142 [Conf]
  10. Ran Canetti, Hugo Krawczyk
    Security Analysis of IKE's Signature-Based Key-Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:143-161 [Conf]
  11. Mihir Bellare, Adriana Palacio
    GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:162-177 [Conf]
  12. Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
    On 2-Round Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:178-193 [Conf]
  13. Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Siebert
    Private Computation - k-Connected versus 1-Connected Networks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:194-209 [Conf]
  14. Phong Q. Nguyen, David Pointcheval
    Analysis and Improvements of NTRU Encryption Paddings. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:210-225 [Conf]
  15. Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier
    Universal Padding Schemes for RSA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:226-241 [Conf]
  16. Alexander May
    Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:242-256 [Conf]
  17. Chi-Jen Lu
    Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:257-271 [Conf]
  18. Ronald Cramer, Serge Fehr
    Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:272-287 [Conf]
  19. David Wagner
    A Generalized Birthday Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:288-303 [Conf]
  20. Ilya Mironov
    (Not So) Random Shuffles of RC4. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:304-319 [Conf]
  21. John Black, Phillip Rogaway, Thomas Shrimpton
    Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:320-335 [Conf]
  22. Karl Rubin, Alice Silverberg
    Supersingular Abelian Varieties in Cryptology. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:336-353 [Conf]
  23. Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, Michael Scott
    Efficient Algorithms for Pairing-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:354-368 [Conf]
  24. Frederik Vercauteren
    Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:369-384 [Conf]
  25. Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson
    Threshold Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:385-400 [Conf]
  26. Jesper Buus Nielsen
    A Threshold Pseudorandom Function Construction and Its Applications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:401-416 [Conf]
  27. Joy Algesheimer, Jan Camenisch, Victor Shoup
    Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:417-432 [Conf]
  28. Wen-Ching W. Li, Mats Näslund, Igor Shparlinski
    Hidden Number Problem with the Trace and Bit Security of XTR and LUC. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:433-448 [Conf]
  29. Ivan Damgård, Jesper Buus Nielsen
    Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:449-464 [Conf]
  30. Emmanuel Bresson, Jacques Stern, Michael Szydlo
    Threshold Ring Signatures and Applications to Ad-hoc Groups. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:465-480 [Conf]
  31. Moni Naor
    Deniable Ring Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:481-498 [Conf]
  32. Gene Itkis, Leonid Reyzin
    SiBIR: Signer-Base Intrusion-Resilient Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:499-514 [Conf]
  33. Don Coppersmith, Shai Halevi, Charanjit S. Jutla
    Cryptanalysis of Stream Ciphers with Linear Masking. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:515-532 [Conf]
  34. Palash Sarkar
    The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:533-548 [Conf]
  35. Claude Carlet
    A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:549-564 [Conf]
  36. Serge Fehr, Ueli M. Maurer
    Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:565-580 [Conf]
  37. Ivan Damgård, Jesper Buus Nielsen
    Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:581-596 [Conf]
  38. Anna Lysyanskaya
    Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:597-612 [Conf]
  39. Jean-Sébastien Coron
    Security Proof for Partial-Domain Hash Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:613-626 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002