


default search action
CT-RSA 2002: San Jose, CA, USA
- Bart Preneel:

Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings. Lecture Notes in Computer Science 2271, Springer 2002, ISBN 3-540-43224-8
Public Key Cryptography
- Burton S. Kaliski Jr.:

On Hash Function Firewalls in Signature Schemes. 1-16 - Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung:

Observability Analysis - Detecting When Improved Cryptosystems Fail. 17-29
Efficient Hardware Implementations
- Colin D. Walter:

Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. 30-39 - Lejla Batina, Geeke Muurling:

Montgomery in Practice: How to Do It More Efficiently in Hardware. 40-52 - Colin D. Walter:

MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. 53-66 - Johannes Wolkerstorfer, Elisabeth Oswald

, Mario Lamberger:
An ASIC Implementation of the AES SBoxes. 67-78
Public Key Cryptography: Theory
- Marc Fischlin:

On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function. 79-95 - Marc Fischlin, Roger Fischlin:

The Representation Problem Based on Factoring. 96-113
Symmetric Ciphers
- John Black, Phillip Rogaway:

Ciphers with Arbitrary Finite Domains. 114-130 - Atsuko Miyaji

, Masao Nonaka, Yoshinori Takii:
Known Plaintext Correlation Attack against RC5. 131-148
E-Commerce and Applications
- Silvio Micali, Ronald L. Rivest:

Micropayments Revisited. 149-163 - Markus Jakobsson, Ari Juels, Phong Q. Nguyen:

Proprietary Certificates. 164-181 - Giuseppe Ateniese, Cristina Nita-Rotaru:

Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. 182-199
Digital Signatures
- Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson:

RSA-Based Undeniable Signatures for General Moduli. 200-217 - Greg Maitland, Colin Boyd:

Co-operatively Formed Group Signatures. 218-235 - Silvio Micali, Ronald L. Rivest:

Transitive Signature Schemes. 236-243 - Robert Johnson, David Molnar, Dawn Xiaodong Song, David A. Wagner:

Homomorphic Signature Schemes. 244-262
Public Key Encryption
- Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval

, Christophe Tymen:
GEM: A Generic Chosen-Ciphertext Secure Encryption Method. 263-276 - Masayuki Abe:

Securing "Encryption + Proof of Knowledge" in the Random Oracle Model. 277-289
Discrete Logarithm
- Qi Cheng

, Shigenori Uchiyama:
Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture. 290-299 - Cheng-Fen Lu, Shiuh-Pyng Winston Shieh:

Secure Key-Evolving Protocols for Discrete Logarithm Schemes. 300-310

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














