Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1--5, 2002. Proceedings (Q1851062)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1--5, 2002. Proceedings |
scientific article; zbMATH DE number 1845438
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1--5, 2002. Proceedings |
scientific article; zbMATH DE number 1845438 |
Statements
Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1--5, 2002. Proceedings (English)
0 references
15 December 2002
0 references
The articles of this volume will be reviewed individually. The preceding conference (7th, 2001) has been reviewed (see Zbl 0977.00048). Indexed articles: \textit{Lenstra, Arjen K.; Shamir, Adi; Tomlinson, Jim; Tromer, Eran}, Analysis of Bernstein's factorization circuit, 1-26 [Zbl 1065.94569] \textit{Lucks, Stefan}, A variant of the Cramer-Shoup cryptosystem for groups of unknown order, 27-45 [Zbl 1065.94555] \textit{Bosma, Wieb; Hutton, James; Verheul, Eric R.}, Looking beyond XTR, 46-63 [Zbl 1065.94539] \textit{Ogata, Wakaha; Kurosawa, Kaoru}, Bounds for robust metering schemes and their relationship with \(A^2\)-code, 64-80 [Zbl 1065.68661] \textit{Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki}, Unconditionally secure anonymous encryption and group authentication, 81-99 [Zbl 1065.94550] \textit{Dent, Alexander W.}, Adapting the weaknesses of the random oracle model to the generic group model, 100-109 [Zbl 1065.94546] \textit{Chang, Yan-Cheng; Hsiao, Chun-Yun; Lu, Chi-Jen}, On the impossibilities of basing one-way permutations on central cryptographic primitives, 110-124 [Zbl 1065.94542] \textit{Damgård, Ivan; Fujisaki, Eiichiro}, A statistically-hiding integer commitment scheme based on groups with hidden order, 125-142 [Zbl 1065.94545] \textit{Hong, Dowon; Chang, Ku-Young; Ryu, Heuisu}, Efficient oblivious transfer in the bounded-storage model, 143-159 [Zbl 1065.94551] \textit{Barkan, Elad; Biham, Eli}, In how many ways can you write Rijndael?, 160-175 [Zbl 1065.68529] \textit{Park, Sangwoo; Sung, Soo Hak; Chee, Seongtaek; Yoon, E-Joong; Lim, Jongin}, On the security of Rijndael-like structures against differential and linear cryptanalysis, 176-191 [Zbl 1065.68530] \textit{Katz, Jonathan; Yung, Moti}, Threshold cryptosystems based on factoring, 192-205 [Zbl 1065.94552] \textit{Abe, Masayuki; Cramer, Ronald; Fehr, Serge}, Non-interactive distributed-verifier proofs and proving relations among commitments, 206-223 [Zbl 1065.94536] \textit{Srinathan, K.; Kumar, M. V. N. Ashwin; Rangan, C. Pandu}, Asynchronous secure communication tolerating mixed adversaries, 224-242 [Zbl 1065.94558] \textit{Kim, Jongsung; Moon, Dukjae; Lee, Wonil; Hong, Seokhie; Lee, Sangjin; Jung, Seokwon}, Amplified boomerang attack against reduced-round SHACAL, 243-253 [Zbl 1065.94553] \textit{Biham, Eli; Dunkelman, Orr; Keller, Nathan}, Enhancing differential-linear cryptanalysis, 254-266 [Zbl 1065.94538] \textit{Courtois, Nicolas T.; Pieprzyk, Josef}, Cryptanalysis of block ciphers with overdefined systems of equations, 267-287 [Zbl 1065.94543] \textit{Klimov, Alexander; Mityagin, Anton; Shamir, Adi}, Analysis of neural cryptography, 288-298 [Zbl 1065.94554] \textit{Catalano, Dario; Nguyen, Phong Q.; Stern, Jacques}, The hardness of Hensel lifting: the case of RSA and discrete logarithm, 299-310 [Zbl 1066.94010] \textit{Gaudry, Pierrick}, A comparison and a combination of SST and AGM algorithms for counting points of elliptic curves in characteristic 2, 311-327 [Zbl 1065.11098] \textit{Koga, Hiroki}, A general formula of the \((t,n)\)-threshold visual secret sharing scheme, 328-345 [Zbl 1065.94564] \textit{D'Arco, Paolo; Stinson, Douglas R.}, On unconditionally secure robust distributed key distribution centers, 346-363 [Zbl 1065.94544] \textit{Granboulan, Louis}, Short signatures in the random oracle model, 364-378 [Zbl 1065.94562] \textit{Hevia, Alejandro; Micciancio, Daniele}, The provable security of graph-based one-time signatures and extensions to algebraic signature schemes, 379-396 [Zbl 1065.94563] \textit{Bellare, Mihir; Neven, Gregory}, Transitive signatures based on factoring and RSA, 397-414 [Zbl 1065.94561] \textit{Abe, Masayuki; Ohkubo, Miyako; Suzuki, Koutarou}, 1-out-of-\(n\) signatures from a variety of keys, 415-432 [Zbl 1065.94560] \textit{Asano, Tomoyuki}, A revocation scheme with minimal storage at receivers, 433-450 [Zbl 1065.94537] \textit{Golle, Philippe; Zhong, Sheng; Boneh, Dan; Jakobsson, Markus; Juels, Ari}, Optimistic mixing for exit-polls, 451-465 [Zbl 1065.94548] \textit{Gupta, Kishan Chand; Sarkar, Palash}, Improved construction of nonlinear resilient S-boxes, 466-483 [Zbl 1065.94549] \textit{Carlet, Claude; Gouget, Aline}, An upper bound on the number of \(m\)-resilient Boolean functions, 484-496 [Zbl 1065.94541] \textit{Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David}, Group Diffie-Hellman key exchange secure against dictionary attacks, 497-514 [Zbl 1065.94540] \textit{Namprempre, Chanathip}, Secure channels based on authenticated encryption schemes: a simple characterization, 515-532 [Zbl 1065.94556] \textit{Zhang, Fangguo; Kim, Kwangjo}, ID-based blind signature and ring signature from pairings, 533-547 [Zbl 1065.94566] \textit{Gentry, Craig; Silverberg, Alice}, Hierarchical ID-based cryptography, 548-566 [Zbl 1065.94547] \textit{Yung, Moti}, Crypto-integrity, 567-573 [Zbl 1065.94559] \textit{Matsumoto, Tsutomu}, Gummy and conductive silicone rubber fingers, 574-575 [Zbl 1065.94565]
0 references
Queenstown (New Zealand)
0 references
Proceedings
0 references
Conference
0 references
ASIACRYPT 2002
0 references
Cryptology
0 references
Information security
0 references