


default search action
SAC 2002: St. John's, Newfoundland, Canada
- Kaisa Nyberg, Howard M. Heys:

Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers. Lecture Notes in Computer Science 2595, Springer 2003, ISBN 3-540-00622-2
Elliptic Curve Enhancements
- John Malone-Lee, Nigel P. Smart:

Modifications of ECDSA. 1-12 - Dongryeol Kim, Seongan Lim:

Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves. 13-20 - Francesco Sica, Mathieu Ciet, Jean-Jacques Quisquater:

Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. 21-36
SNOW
- Philip Hawkes, Gregory G. Rose:

Guess-and-Determine Attacks on SNOW. 37-46 - Patrik Ekdahl, Thomas Johansson:

A New Version of the Stream Cipher SNOW. 47-61
Encryption Schemes
- John Black, Phillip Rogaway, Thomas Shrimpton:

Encryption-Scheme Security in the Presence of Key-Dependent Messages. 62-75 - Jakob Jonsson:

On the Security of CTR + CBC-MAC. 76-93 - Soichi Furuya, Kouichi Sakurai:

Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. 94-109
Differential Attacks
- Ben Reichardt, David A. Wagner:

Markov Truncated Differential Cryptanalysis of Skipjack. 110-128 - Yasuo Hatano, Hiroki Sekine, Toshinobu Kaneko:

Higher Order Differential Attack of Camellia (II). 129-146 - Hüseyin Demirci:

Square-like Attacks on Reduced Rounds of IDEA. 147-159 - Donghoon Chang, Jaechul Sung

, Soo Hak Sung, Sangjin Lee, Jongin Lim:
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. 160-174
Boolean Functions and Stream Ciphers
- Pascale Charpin, Enes Pasalic:

On Propagation Characteristics of Resilient Functions. 175-195 - Paul Camion, Miodrag J. Mihaljevic, Hideki Imai:

Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). 196-213 - Subhamoy Maitra, Kishan Chand Gupta, Ayineedi Venkateswarlu:

Multiples of Primitive Polynomials and Their Products over GF(2). 214-231 - Sabine Leveiller, Gilles Zémor, Philippe Guillot, Joseph Boutros:

A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function. 232-249
Block Cipher Security
- Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot:

White-Box Cryptography and an AES Implementation. 250-270 - Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram:

Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. 271-290
Signatures and Secret Sharing
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis

, Douglas R. Stinson:
New Results on Unconditionally Secure Distributed Oblivious Transfer. 291-309 - Florian Hess:

Efficient Identity Based Signature Schemes Based on Pairings. 310-324 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval

:
The Group Diffie-Hellman Problems. 325-338
MAC and Hash Constructions
- Shoichi Hirose

:
Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. 339-352 - Sarvar Patel:

An Efficient MAC for Short Messages. 353-368
RSA and XTR Enhancements
- Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim:

Optimal Extension Fields for XTR. 369-384 - M. Jason Hinek, Mo King Low, Edlyn Teske:

On Some Attacks on Multi-prime RSA. 385-404

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














