


default search action
ASIACRYPT 2001: Gold Coast, Australia
- Colin Boyd:
Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings. Lecture Notes in Computer Science 2248, Springer 2001, ISBN 3-540-42987-5
Lattice Based Cryptography
- Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo:
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. 1-20 - Phong Q. Nguyen, Igor E. Shparlinski
:
On the Insecurity of a Server-Aided RSA Protocol. 21-35 - Dan Boneh, Shai Halevi, Nick Howgrave-Graham:
The Modular Inversion Hidden Number Problem. 36-51
Human Identification
- Nicholas J. Hopper, Manuel Blum:
Secure Human Identification Protocols. 52-66
Invited Talk
- Arjen K. Lenstra:
Unbelievable Security. Matching AES Security Using Public Key Systems. 67-86
Practical Public Key Cryptography
- Siguna Müller:
A Probable Prime Test with Very High Confidence for n equiv 1 mod 4. 87-106 - Emmanuel Thomé
:
Computation of Discrete Logarithms in F2607. 107-124 - Martijn Stam, Arjen K. Lenstra:
Speeding Up XTR. 125-143 - Jae Choon Cha, Ki Hyoung Ko, Sangjin Lee, Jae Woo Han, Jung Hee Cheon:
An Efficient Implementation of Braid Groups. 144-156
Cryptography Based on Coding Theory
- Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier:
How to Achieve a McEliece-Based Digital Signature Scheme. 157-174 - Alice Silverberg, Jessica Staddon, Judy L. Walker:
Efficient Traitor Tracing Algorithms Using List Decoding. 175-192
Block Ciphers
- Makoto Sugita, Kazukuni Kobara, Hideki Imai:
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. 193-207 - Deukjo Hong, Jaechul Sung
, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi:
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. 208-221 - Jacques Patarin:
Generic Attacks on Feistel Schemes. 222-238 - Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji Munetoh
:
A Compact Rijndael Hardware Architecture with S-Box Optimization. 239-254
Provable Security
- Ju-Sung Kang, Sang-Uk Shin, Dowon Hong
, Okyeon Yi:
Provable Security of KASUMI and 3GPP Encryption Mode f8. 255-271 - Duncan S. Wong, Agnes Hui Chan:
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. 272-289 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval
:
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. 290-309
Threshold Cryptography
- Pierre-Alain Fouque, Jacques Stern:
Fully Distributed Threshold RSA under Standard Assumptions. 310-330 - Anna Lysyanskaya, Chris Peikert:
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. 331-350 - Pierre-Alain Fouque
, David Pointcheval
:
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. 351-368
Two-Party Protocols
- Yan-Cheng Chang, Chi-Jen Lu:
Oblivious Polynomial Evaluation and Oblivious Neural Learning. 369-384 - Moses D. Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam D. Smith:
Mutually Independent Commitments. 385-401
Zero Knowledge
- Nicolas T. Courtois:
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. 402-421 - Tzafrir Cohen, Joe Kilian, Erez Petrank:
Responsive Round Complexity and Concurrent Zero-Knowledge. 422-441
Cryptographic Building Blocks
- Johan Håstad, Mats Näslund:
Practical Construction and Analysis of Pseudo-Randomness Primitives. 442-459 - Yuriy V. Tarannikov
, Peter Korolev, Anton Botev:
Autocorrelation Coefficients and Correlation Immunity of Boolean Functions. 460-479
Elliptic Curve Cryptography
- Pierrick Gaudry, Nicolas Gürel:
An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves. 480-494 - Steven D. Galbraith:
Supersingular Curves in Cryptography. 495-513 - Dan Boneh, Ben Lynn, Hovav Shacham:
Short Signatures from the Weil Pairing. 514-532 - Eric R. Verheul:
Self-Blindable Credential Certificates from the Weil Pairing. 533-551
Anonymity
- Ronald L. Rivest, Adi Shamir, Yael Tauman:
How to Leak a Secret. 552-565 - Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval
:
Key-Privacy in Public-Key Encryption. 566-582 - Masayuki Abe, Miyako Ohkubo:
Provably Secure Fair Blind Signatures with Tight Revocation. 583-602

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.