Conferences in DBLP
Rosario Gennaro , Daniele Micciancio Cryptanalysis of a Pseudorandom Generator Based on Braid Groups. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:1-13 [Conf ] Sangjin Lee , Eonkyung Lee Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:14-28 [Conf ] Steven D. Galbraith , Florian Hess , Nigel P. Smart Extending the GHS Weil Descent Attack. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:29-44 [Conf ] Ronald Cramer , Victor Shoup Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:45-64 [Conf ] Yevgeniy Dodis , Jonathan Katz , Shouhuai Xu , Moti Yung Key-Insulated Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:65-82 [Conf ] Jee Hea An , Yevgeniy Dodis , Tal Rabin On the Security of Joint Signature and Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:83-107 [Conf ] Joan Daemen , Vincent Rijmen AES and the Wide Trail Design Strategy. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:108-109 [Conf ] Ueli M. Maurer Indistinguishability of Random Systems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:110-132 [Conf ] Alexander Russell , Hong Wang 0002 How to Fool an Unbounded Adversary with a Short Key. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:133-148 [Conf ] David P. Woodruff , Marten van Dijk Cryptography in an Unbounded Computational Model. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:149-164 [Conf ] Junko Nakajima , Mitsuru Matsui Performance Analysis and Parallel Implementation of Dedicated Hash Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:165-180 [Conf ] John A. Clark , Jeremy L. Jacob Fault Injection and a Timing Channel on an Analysis Technique. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:181-196 [Conf ] Young-Ho Park , Sangtae Jeong , Jongin Lim Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:197-208 [Conf ] Philippe Chose , Antoine Joux , Michel Mitton Fast Correlation Attacks: An Algorithmic Point of View. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:209-221 [Conf ] Matthias Krause BDD-Based Cryptanalysis of Keystream Generators. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:222-237 [Conf ] Jovan Dj. Golic , Vittorio Bagini , Guglielmo Morgari Linear Cryptanalysis of Bluetooth Stream Cipher. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:238-255 [Conf ] Ivan Damgård , Maciej Koprowski Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:256-271 [Conf ] Jean-Sébastien Coron Optimal Security Proofs for PSS and Other Signature Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:272-287 [Conf ] Henri Gilbert , Marine Minier Cryptanalysis of SFLASH. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:288-298 [Conf ] Craig Gentry , Michael Szydlo Cryptanalysis of the Revised NTRU Signature Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:299-320 [Conf ] Emmanuel Bresson , Olivier Chevassut , David Pointcheval Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:321-336 [Conf ] Ran Canetti , Hugo Krawczyk Universally Composable Notions of Key Exchange and Secure Channels. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:337-351 [Conf ] Donald Beaver On Deniability in Quantum Key Exchange. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:352-367 [Conf ] Anand Desai , Alejandro Hevia , Yiqun Lisa Yin A Practice-Oriented Treatment of Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:368-383 [Conf ] John Black , Phillip Rogaway A Block-Cipher Mode of Operation for Parallelizable Message Authentication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:384-397 [Conf ] Stephen T. Kent Rethinking PKI: What's Trust Got to Do with It? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:398-399 [Conf ] Tal Malkin , Daniele Micciancio , Sara K. Miner Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:400-417 [Conf ] Michel Abdalla , Jee Hea An , Mihir Bellare , Chanathip Namprempre From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:418-433 [Conf ] Junji Shikata , Goichiro Hanaoka , Yuliang Zheng , Hideki Imai Security Notions for Unconditionally Secure Signature Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:434-449 [Conf ] Aggelos Kiayias , Moti Yung Traitor Tracing with Constant Transmission Rate. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:450-465 [Conf ] Jeremy Horwitz , Ben Lynn Toward Hierarchical Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:466-481 [Conf ] Matthias Fitzi , Nicolas Gisin , Ueli M. Maurer , Oliver von Rotz Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:482-501 [Conf ] Yvo Desmedt , Yongge Wang Perfectly Secure Message Transmission Revisited. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:502-517 [Conf ] Anne Canteaut , Marion Videau Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:518-533 [Conf ] Serge Vaudenay Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:534-546 [Conf ]