The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
2002 (conf/asiacrypt/2002)

  1. Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer
    Analysis of Bernstein's Factorization Circuit. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:1-26 [Conf]
  2. Stefan Lucks
    A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:27-45 [Conf]
  3. Wieb Bosma, James Hutton, Eric R. Verheul
    Looking beyond XTR. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:46-63 [Conf]
  4. Wakaha Ogata, Kaoru Kurosawa
    Bounds for Robust Metering Schemes and Their Relationship with A-code. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:64-80 [Conf]
  5. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
    Unconditionally Secure Anonymous Encryption and Group Authentication. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:81-99 [Conf]
  6. Alexander W. Dent
    Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:100-109 [Conf]
  7. Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu
    On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:110-124 [Conf]
  8. Ivan Damgård, Eiichiro Fujisaki
    A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:125-142 [Conf]
  9. Dowon Hong, Ku-Young Chang, Heuisu Ryu
    Efficient Oblivious Transfer in the Bounded-Storage Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:143-159 [Conf]
  10. Elad Barkan, Eli Biham
    In How Many Ways Can You Write Rijndael? [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:160-175 [Conf]
  11. Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim
    On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:176-191 [Conf]
  12. Jonathan Katz, Moti Yung
    Threshold Cryptosystems Based on Factoring. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:192-205 [Conf]
  13. Masayuki Abe, Ronald Cramer, Serge Fehr
    Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:206-223 [Conf]
  14. K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan
    Asynchronous Secure Communication Tolerating Mixed Adversaries. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:224-242 [Conf]
  15. Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung
    Amplified Boomerang Attack against Reduced-Round SHACAL. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:243-253 [Conf]
  16. Eli Biham, Orr Dunkelman, Nathan Keller
    Enhancing Differential-Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:254-266 [Conf]
  17. Nicolas Courtois, Josef Pieprzyk
    Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:267-287 [Conf]
  18. Alexander Klimov, Anton Mityagin, Adi Shamir
    Analysis of Neural Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:288-298 [Conf]
  19. Dario Catalano, Phong Q. Nguyen, Jacques Stern
    The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:299-310 [Conf]
  20. Pierrick Gaudry
    A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:311-327 [Conf]
  21. Hiroki Koga
    A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:328-345 [Conf]
  22. Paolo D'Arco, Douglas R. Stinson
    On Unconditionally Secure Robust Distributed Key Distribution Centers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:346-363 [Conf]
  23. Louis Granboulan
    Short Signatures in the Random Oracle Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:364-378 [Conf]
  24. Alejandro Hevia, Daniele Micciancio
    The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:379-396 [Conf]
  25. Mihir Bellare, Gregory Neven
    Transitive Signatures Based on Factoring and RSA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:397-414 [Conf]
  26. Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki
    1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:415-432 [Conf]
  27. Tomoyuki Asano
    A Revocation Scheme with Minimal Storage at Receivers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:433-450 [Conf]
  28. Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels
    Optimistic Mixing for Exit-Polls. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:451-465 [Conf]
  29. Kishan Chand Gupta, Palash Sarkar
    Improved Construction of Nonlinear Resilient S-Boxes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:466-483 [Conf]
  30. Claude Carlet, Aline Gouget
    An Upper Bound on the Number of m-Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:484-496 [Conf]
  31. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:497-514 [Conf]
  32. Chanathip Namprempre
    Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:515-532 [Conf]
  33. Fangguo Zhang, Kwangjo Kim
    ID-Based Blind Signature and Ring Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:533-547 [Conf]
  34. Craig Gentry, Alice Silverberg
    Hierarchical ID-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:548-566 [Conf]
  35. Moti Yung
    Crypto-integrity. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:567-573 [Conf]
  36. Tsutomu Matsumoto
    Gummy and Conductive Silicone Rubber Fingers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:574-576 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002