Conferences in DBLP
Arjen K. Lenstra , Adi Shamir , Jim Tomlinson , Eran Tromer Analysis of Bernstein's Factorization Circuit. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:1-26 [Conf ] Stefan Lucks A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:27-45 [Conf ] Wieb Bosma , James Hutton , Eric R. Verheul Looking beyond XTR. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:46-63 [Conf ] Wakaha Ogata , Kaoru Kurosawa Bounds for Robust Metering Schemes and Their Relationship with A-code. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:64-80 [Conf ] Goichiro Hanaoka , Junji Shikata , Yumiko Hanaoka , Hideki Imai Unconditionally Secure Anonymous Encryption and Group Authentication. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:81-99 [Conf ] Alexander W. Dent Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:100-109 [Conf ] Yan-Cheng Chang , Chun-Yun Hsiao , Chi-Jen Lu On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:110-124 [Conf ] Ivan Damgård , Eiichiro Fujisaki A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:125-142 [Conf ] Dowon Hong , Ku-Young Chang , Heuisu Ryu Efficient Oblivious Transfer in the Bounded-Storage Model. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:143-159 [Conf ] Elad Barkan , Eli Biham In How Many Ways Can You Write Rijndael? [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:160-175 [Conf ] Sangwoo Park , Soo Hak Sung , Seongtaek Chee , E-Joong Yoon , Jongin Lim On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:176-191 [Conf ] Jonathan Katz , Moti Yung Threshold Cryptosystems Based on Factoring. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:192-205 [Conf ] Masayuki Abe , Ronald Cramer , Serge Fehr Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:206-223 [Conf ] K. Srinathan , M. V. N. Ashwin Kumar , C. Pandu Rangan Asynchronous Secure Communication Tolerating Mixed Adversaries. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:224-242 [Conf ] Jongsung Kim , Dukjae Moon , Wonil Lee , Seokhie Hong , Sangjin Lee , Seokwon Jung Amplified Boomerang Attack against Reduced-Round SHACAL. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:243-253 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller Enhancing Differential-Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:254-266 [Conf ] Nicolas Courtois , Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:267-287 [Conf ] Alexander Klimov , Anton Mityagin , Adi Shamir Analysis of Neural Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:288-298 [Conf ] Dario Catalano , Phong Q. Nguyen , Jacques Stern The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:299-310 [Conf ] Pierrick Gaudry A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:311-327 [Conf ] Hiroki Koga A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:328-345 [Conf ] Paolo D'Arco , Douglas R. Stinson On Unconditionally Secure Robust Distributed Key Distribution Centers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:346-363 [Conf ] Louis Granboulan Short Signatures in the Random Oracle Model. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:364-378 [Conf ] Alejandro Hevia , Daniele Micciancio The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:379-396 [Conf ] Mihir Bellare , Gregory Neven Transitive Signatures Based on Factoring and RSA. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:397-414 [Conf ] Masayuki Abe , Miyako Ohkubo , Koutarou Suzuki 1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:415-432 [Conf ] Tomoyuki Asano A Revocation Scheme with Minimal Storage at Receivers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:433-450 [Conf ] Philippe Golle , Sheng Zhong , Dan Boneh , Markus Jakobsson , Ari Juels Optimistic Mixing for Exit-Polls. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:451-465 [Conf ] Kishan Chand Gupta , Palash Sarkar Improved Construction of Nonlinear Resilient S-Boxes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:466-483 [Conf ] Claude Carlet , Aline Gouget An Upper Bound on the Number of m-Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:484-496 [Conf ] Emmanuel Bresson , Olivier Chevassut , David Pointcheval Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:497-514 [Conf ] Chanathip Namprempre Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:515-532 [Conf ] Fangguo Zhang , Kwangjo Kim ID-Based Blind Signature and Ring Signature from Pairings. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:533-547 [Conf ] Craig Gentry , Alice Silverberg Hierarchical ID-Based Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:548-566 [Conf ] Moti Yung Crypto-integrity. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:567-573 [Conf ] Tsutomu Matsumoto Gummy and Conductive Silicone Rubber Fingers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:574-576 [Conf ]