


default search action
CT-RSA 2002: San Jose, CA, USA
- Bart Preneel:
Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings. Lecture Notes in Computer Science 2271, Springer 2002, ISBN 3-540-43224-8
Public Key Cryptography
- Burton S. Kaliski Jr.:
On Hash Function Firewalls in Signature Schemes. 1-16 - Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung:
Observability Analysis - Detecting When Improved Cryptosystems Fail. 17-29
Efficient Hardware Implementations
- Colin D. Walter:
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. 30-39 - Lejla Batina, Geeke Muurling:
Montgomery in Practice: How to Do It More Efficiently in Hardware. 40-52 - Colin D. Walter:
MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. 53-66 - Johannes Wolkerstorfer, Elisabeth Oswald
, Mario Lamberger:
An ASIC Implementation of the AES SBoxes. 67-78
Public Key Cryptography: Theory
- Marc Fischlin:
On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function. 79-95 - Marc Fischlin, Roger Fischlin:
The Representation Problem Based on Factoring. 96-113
Symmetric Ciphers
- John Black, Phillip Rogaway:
Ciphers with Arbitrary Finite Domains. 114-130 - Atsuko Miyaji
, Masao Nonaka, Yoshinori Takii:
Known Plaintext Correlation Attack against RC5. 131-148
E-Commerce and Applications
- Silvio Micali, Ronald L. Rivest:
Micropayments Revisited. 149-163 - Markus Jakobsson, Ari Juels, Phong Q. Nguyen:
Proprietary Certificates. 164-181 - Giuseppe Ateniese, Cristina Nita-Rotaru:
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. 182-199
Digital Signatures
- Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson:
RSA-Based Undeniable Signatures for General Moduli. 200-217 - Greg Maitland, Colin Boyd:
Co-operatively Formed Group Signatures. 218-235 - Silvio Micali, Ronald L. Rivest:
Transitive Signature Schemes. 236-243 - Robert Johnson, David Molnar, Dawn Xiaodong Song, David A. Wagner:
Homomorphic Signature Schemes. 244-262
Public Key Encryption
- Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval
, Christophe Tymen:
GEM: A Generic Chosen-Ciphertext Secure Encryption Method. 263-276 - Masayuki Abe:
Securing "Encryption + Proof of Knowledge" in the Random Oracle Model. 277-289
Discrete Logarithm
- Qi Cheng
, Shigenori Uchiyama:
Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture. 290-299 - Cheng-Fen Lu, Shiuh-Pyng Winston Shieh:
Secure Key-Evolving Protocols for Discrete Logarithm Schemes. 300-310

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.