


default search action
ASIACRYPT 2002: Queenstown, New Zealand
- Yuliang Zheng

:
Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Lecture Notes in Computer Science 2501, Springer 2002, ISBN 3-540-00171-9 - Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer

:
Analysis of Bernstein's Factorization Circuit. 1-26 - Stefan Lucks:

A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. 27-45 - Wieb Bosma, James Hutton, Eric R. Verheul:

Looking beyond XTR. 46-63 - Wakaha Ogata

, Kaoru Kurosawa:
Bounds for Robust Metering Schemes and Their Relationship with A-code. 64-80 - Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:

Unconditionally Secure Anonymous Encryption and Group Authentication. 81-99 - Alexander W. Dent:

Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. 100-109 - Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu:

On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives. 110-124 - Ivan Damgård, Eiichiro Fujisaki:

A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. 125-142 - Dowon Hong

, Ku-Young Chang, Heuisu Ryu:
Efficient Oblivious Transfer in the Bounded-Storage Model. 143-159 - Elad Barkan, Eli Biham:

In How Many Ways Can You Write Rijndael? 160-175 - Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim:

On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. 176-191 - Jonathan Katz, Moti Yung:

Threshold Cryptosystems Based on Factoring. 192-205 - Masayuki Abe, Ronald Cramer, Serge Fehr:

Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. 206-223 - K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan:

Asynchronous Secure Communication Tolerating Mixed Adversaries. 224-242 - Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seok Won Jung:

Amplified Boomerang Attack against Reduced-Round SHACAL. 243-253 - Eli Biham, Orr Dunkelman

, Nathan Keller:
Enhancing Differential-Linear Cryptanalysis. 254-266 - Nicolas T. Courtois, Josef Pieprzyk

:
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. 267-287 - Alexander Klimov, Anton Mityagin, Adi Shamir:

Analysis of Neural Cryptography. 288-298 - Dario Catalano, Phong Q. Nguyen, Jacques Stern:

The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. 299-310 - Pierrick Gaudry:

A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2. 311-327 - Hiroki Koga:

A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme. 328-345 - Paolo D'Arco, Douglas R. Stinson:

On Unconditionally Secure Robust Distributed Key Distribution Centers. 346-363 - Louis Granboulan:

Short Signatures in the Random Oracle Model. 364-378 - Alejandro Hevia

, Daniele Micciancio
:
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes. 379-396 - Mihir Bellare, Gregory Neven:

Transitive Signatures Based on Factoring and RSA. 397-414 - Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki:

1-out-of-n Signatures from a Variety of Keys. 415-432 - Tomoyuki Asano:

A Revocation Scheme with Minimal Storage at Receivers. 433-450 - Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels:

Optimistic Mixing for Exit-Polls. 451-465 - Kishan Chand Gupta, Palash Sarkar:

Improved Construction of Nonlinear Resilient S-Boxes. 466-483 - Claude Carlet, Aline Gouget:

An Upper Bound on the Number of m-Resilient Boolean Functions. 484-496 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval

:
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. 497-514 - Chanathip Namprempre:

Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. 515-532 - Fangguo Zhang

, Kwangjo Kim:
ID-Based Blind Signature and Ring Signature from Pairings. 533-547 - Craig Gentry, Alice Silverberg:

Hierarchical ID-Based Cryptography. 548-566 - Moti Yung:

Crypto-integrity. 567-573 - Tsutomu Matsumoto:

Gummy and Conductive Silicone Rubber Fingers. 574-576

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














