The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
2002 (conf/eurocrypt/2002)

  1. Rosario Gennaro, Daniele Micciancio
    Cryptanalysis of a Pseudorandom Generator Based on Braid Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:1-13 [Conf]
  2. Sangjin Lee, Eonkyung Lee
    Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:14-28 [Conf]
  3. Steven D. Galbraith, Florian Hess, Nigel P. Smart
    Extending the GHS Weil Descent Attack. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:29-44 [Conf]
  4. Ronald Cramer, Victor Shoup
    Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:45-64 [Conf]
  5. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
    Key-Insulated Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:65-82 [Conf]
  6. Jee Hea An, Yevgeniy Dodis, Tal Rabin
    On the Security of Joint Signature and Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:83-107 [Conf]
  7. Joan Daemen, Vincent Rijmen
    AES and the Wide Trail Design Strategy. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:108-109 [Conf]
  8. Ueli M. Maurer
    Indistinguishability of Random Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:110-132 [Conf]
  9. Alexander Russell, Hong Wang 0002
    How to Fool an Unbounded Adversary with a Short Key. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:133-148 [Conf]
  10. David P. Woodruff, Marten van Dijk
    Cryptography in an Unbounded Computational Model. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:149-164 [Conf]
  11. Junko Nakajima, Mitsuru Matsui
    Performance Analysis and Parallel Implementation of Dedicated Hash Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:165-180 [Conf]
  12. John A. Clark, Jeremy L. Jacob
    Fault Injection and a Timing Channel on an Analysis Technique. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:181-196 [Conf]
  13. Young-Ho Park, Sangtae Jeong, Jongin Lim
    Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:197-208 [Conf]
  14. Philippe Chose, Antoine Joux, Michel Mitton
    Fast Correlation Attacks: An Algorithmic Point of View. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:209-221 [Conf]
  15. Matthias Krause
    BDD-Based Cryptanalysis of Keystream Generators. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:222-237 [Conf]
  16. Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari
    Linear Cryptanalysis of Bluetooth Stream Cipher. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:238-255 [Conf]
  17. Ivan Damgård, Maciej Koprowski
    Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:256-271 [Conf]
  18. Jean-Sébastien Coron
    Optimal Security Proofs for PSS and Other Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:272-287 [Conf]
  19. Henri Gilbert, Marine Minier
    Cryptanalysis of SFLASH. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:288-298 [Conf]
  20. Craig Gentry, Michael Szydlo
    Cryptanalysis of the Revised NTRU Signature Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:299-320 [Conf]
  21. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:321-336 [Conf]
  22. Ran Canetti, Hugo Krawczyk
    Universally Composable Notions of Key Exchange and Secure Channels. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:337-351 [Conf]
  23. Donald Beaver
    On Deniability in Quantum Key Exchange. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:352-367 [Conf]
  24. Anand Desai, Alejandro Hevia, Yiqun Lisa Yin
    A Practice-Oriented Treatment of Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:368-383 [Conf]
  25. John Black, Phillip Rogaway
    A Block-Cipher Mode of Operation for Parallelizable Message Authentication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:384-397 [Conf]
  26. Stephen T. Kent
    Rethinking PKI: What's Trust Got to Do with It? [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:398-399 [Conf]
  27. Tal Malkin, Daniele Micciancio, Sara K. Miner
    Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:400-417 [Conf]
  28. Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre
    From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:418-433 [Conf]
  29. Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
    Security Notions for Unconditionally Secure Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:434-449 [Conf]
  30. Aggelos Kiayias, Moti Yung
    Traitor Tracing with Constant Transmission Rate. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:450-465 [Conf]
  31. Jeremy Horwitz, Ben Lynn
    Toward Hierarchical Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:466-481 [Conf]
  32. Matthias Fitzi, Nicolas Gisin, Ueli M. Maurer, Oliver von Rotz
    Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:482-501 [Conf]
  33. Yvo Desmedt, Yongge Wang
    Perfectly Secure Message Transmission Revisited. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:502-517 [Conf]
  34. Anne Canteaut, Marion Videau
    Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:518-533 [Conf]
  35. Serge Vaudenay
    Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:534-546 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002