


default search action
ASIACRYPT 2001: Gold Coast, Australia
- Colin Boyd:

Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings. Lecture Notes in Computer Science 2248, Springer 2001, ISBN 3-540-42987-5
Lattice Based Cryptography
- Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo:

Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. 1-20 - Phong Q. Nguyen, Igor E. Shparlinski

:
On the Insecurity of a Server-Aided RSA Protocol. 21-35 - Dan Boneh, Shai Halevi, Nick Howgrave-Graham:

The Modular Inversion Hidden Number Problem. 36-51
Human Identification
- Nicholas J. Hopper, Manuel Blum:

Secure Human Identification Protocols. 52-66
Invited Talk
- Arjen K. Lenstra:

Unbelievable Security. Matching AES Security Using Public Key Systems. 67-86
Practical Public Key Cryptography
- Siguna Müller:

A Probable Prime Test with Very High Confidence for n equiv 1 mod 4. 87-106 - Emmanuel Thomé

:
Computation of Discrete Logarithms in F2607. 107-124 - Martijn Stam, Arjen K. Lenstra:

Speeding Up XTR. 125-143 - Jae Choon Cha, Ki Hyoung Ko, Sangjin Lee, Jae Woo Han, Jung Hee Cheon:

An Efficient Implementation of Braid Groups. 144-156
Cryptography Based on Coding Theory
- Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier:

How to Achieve a McEliece-Based Digital Signature Scheme. 157-174 - Alice Silverberg, Jessica Staddon, Judy L. Walker:

Efficient Traitor Tracing Algorithms Using List Decoding. 175-192
Block Ciphers
- Makoto Sugita, Kazukuni Kobara, Hideki Imai:

Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. 193-207 - Deukjo Hong, Jaechul Sung

, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi:
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. 208-221 - Jacques Patarin:

Generic Attacks on Feistel Schemes. 222-238 - Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji Munetoh

:
A Compact Rijndael Hardware Architecture with S-Box Optimization. 239-254
Provable Security
- Ju-Sung Kang, Sang-Uk Shin, Dowon Hong

, Okyeon Yi:
Provable Security of KASUMI and 3GPP Encryption Mode f8. 255-271 - Duncan S. Wong, Agnes Hui Chan:

Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. 272-289 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval

:
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. 290-309
Threshold Cryptography
- Pierre-Alain Fouque, Jacques Stern:

Fully Distributed Threshold RSA under Standard Assumptions. 310-330 - Anna Lysyanskaya, Chris Peikert:

Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. 331-350 - Pierre-Alain Fouque

, David Pointcheval
:
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. 351-368
Two-Party Protocols
- Yan-Cheng Chang, Chi-Jen Lu:

Oblivious Polynomial Evaluation and Oblivious Neural Learning. 369-384 - Moses D. Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam D. Smith:

Mutually Independent Commitments. 385-401
Zero Knowledge
- Nicolas T. Courtois:

Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. 402-421 - Tzafrir Cohen, Joe Kilian, Erez Petrank:

Responsive Round Complexity and Concurrent Zero-Knowledge. 422-441
Cryptographic Building Blocks
- Johan Håstad, Mats Näslund:

Practical Construction and Analysis of Pseudo-Randomness Primitives. 442-459 - Yuriy V. Tarannikov

, Peter Korolev, Anton Botev:
Autocorrelation Coefficients and Correlation Immunity of Boolean Functions. 460-479
Elliptic Curve Cryptography
- Pierrick Gaudry, Nicolas Gürel:

An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves. 480-494 - Steven D. Galbraith:

Supersingular Curves in Cryptography. 495-513 - Dan Boneh, Ben Lynn, Hovav Shacham:

Short Signatures from the Weil Pairing. 514-532 - Eric R. Verheul:

Self-Blindable Credential Certificates from the Weil Pairing. 533-551
Anonymity
- Ronald L. Rivest, Adi Shamir, Yael Tauman:

How to Leak a Secret. 552-565 - Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval

:
Key-Privacy in Public-Key Encryption. 566-582 - Masayuki Abe, Miyako Ohkubo:

Provably Secure Fair Blind Signatures with Tight Revocation. 583-602

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














