default search action
ASIACRYPT 2002: Queenstown, New Zealand
- Yuliang Zheng:
Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Lecture Notes in Computer Science 2501, Springer 2002, ISBN 3-540-00171-9 - Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer:
Analysis of Bernstein's Factorization Circuit. 1-26 - Stefan Lucks:
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. 27-45 - Wieb Bosma, James Hutton, Eric R. Verheul:
Looking beyond XTR. 46-63 - Wakaha Ogata, Kaoru Kurosawa:
Bounds for Robust Metering Schemes and Their Relationship with A-code. 64-80 - Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication. 81-99 - Alexander W. Dent:
Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. 100-109 - Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu:
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives. 110-124 - Ivan Damgård, Eiichiro Fujisaki:
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. 125-142 - Dowon Hong, Ku-Young Chang, Heuisu Ryu:
Efficient Oblivious Transfer in the Bounded-Storage Model. 143-159 - Elad Barkan, Eli Biham:
In How Many Ways Can You Write Rijndael? 160-175 - Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim:
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. 176-191 - Jonathan Katz, Moti Yung:
Threshold Cryptosystems Based on Factoring. 192-205 - Masayuki Abe, Ronald Cramer, Serge Fehr:
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. 206-223 - K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan:
Asynchronous Secure Communication Tolerating Mixed Adversaries. 224-242 - Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seok Won Jung:
Amplified Boomerang Attack against Reduced-Round SHACAL. 243-253 - Eli Biham, Orr Dunkelman, Nathan Keller:
Enhancing Differential-Linear Cryptanalysis. 254-266 - Nicolas T. Courtois, Josef Pieprzyk:
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. 267-287 - Alexander Klimov, Anton Mityagin, Adi Shamir:
Analysis of Neural Cryptography. 288-298 - Dario Catalano, Phong Q. Nguyen, Jacques Stern:
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. 299-310 - Pierrick Gaudry:
A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2. 311-327 - Hiroki Koga:
A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme. 328-345 - Paolo D'Arco, Douglas R. Stinson:
On Unconditionally Secure Robust Distributed Key Distribution Centers. 346-363 - Louis Granboulan:
Short Signatures in the Random Oracle Model. 364-378 - Alejandro Hevia, Daniele Micciancio:
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes. 379-396 - Mihir Bellare, Gregory Neven:
Transitive Signatures Based on Factoring and RSA. 397-414 - Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki:
1-out-of-n Signatures from a Variety of Keys. 415-432 - Tomoyuki Asano:
A Revocation Scheme with Minimal Storage at Receivers. 433-450 - Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels:
Optimistic Mixing for Exit-Polls. 451-465 - Kishan Chand Gupta, Palash Sarkar:
Improved Construction of Nonlinear Resilient S-Boxes. 466-483 - Claude Carlet, Aline Gouget:
An Upper Bound on the Number of m-Resilient Boolean Functions. 484-496 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval:
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. 497-514 - Chanathip Namprempre:
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. 515-532 - Fangguo Zhang, Kwangjo Kim:
ID-Based Blind Signature and Ring Signature from Pairings. 533-547 - Craig Gentry, Alice Silverberg:
Hierarchical ID-Based Cryptography. 548-566 - Moti Yung:
Crypto-integrity. 567-573 - Tsutomu Matsumoto:
Gummy and Conductive Silicone Rubber Fingers. 574-576
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.