Advances in Cryptology — EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques Amsterdam, The Netherlands, April 28 – May 2, 2002 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2002, held in Amsterdam, The Netherlands, in April/May 2002.
The 33 revised full papers presented were carefully reviewed and selected from a total of 122 submissions. The papers are organized in topical sections on cryptanalysis, public-key encryption, information theory and new models, implementational analysis, stream ciphers, digital signatures, key exchange, modes of operation, traitor tracing and id-based encryption, multiparty and multicast, and symmetric cryptology.

Author(s): Rosario Gennaro, Daniele Micciancio (auth.), Lars R. Knudsen (eds.)
Series: Lecture Notes in Computer Science 2332
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2002

Language: English
Pages: 552
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems; Computer Communication Networks; Operating Systems

Cryptanalysis of a Pseudorandom Generator Based on Braid Groups....Pages 1-13
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups....Pages 14-28
Extending the GHS Weil Descent Attack....Pages 29-44
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption....Pages 45-64
Key-Insulated Public Key Cryptosystems....Pages 65-82
On the Security of Joint Signature and Encryption....Pages 83-107
AES and the Wide Trail Design Strategy....Pages 108-109
Indistinguishability of Random Systems....Pages 110-132
How to Fool an Unbounded Adversary with a Short Key....Pages 133-148
Cryptography in an Unbounded Computational Model....Pages 149-164
Performance Analysis and Parallel Implementation of Dedicated Hash Functions....Pages 165-180
Fault Injection and a Timing Channel on an Analysis Technique....Pages 181-196
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms....Pages 197-208
Fast Correlation Attacks: An Algorithmic Point of View....Pages 209-221
BDD-Based Cryptanalysis of Keystream Generators....Pages 222-237
Linear Cryptanalysis of Bluetooth Stream Cipher....Pages 238-255
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups....Pages 256-271
Optimal Security Proofs for PSS and Other Signature Schemes....Pages 272-287
Cryptanalysis of SFLASH....Pages 288-298
Cryptanalysis of the Revised NTRU Signature Scheme....Pages 299-320
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions....Pages 321-336
Universally Composable Notions of Key Exchange and Secure Channels....Pages 337-351
On Deniability in Quantum Key Exchange....Pages 352-367
A Practice-Oriented Treatment of Pseudorandom Number Generators....Pages 368-383
A Block-Cipher Mode of Operation for Parallelizable Message Authentication....Pages 384-397
Rethinking PKI: What’s Trust Got to Do with It?....Pages 398-399
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods....Pages 400-417
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security....Pages 418-433
Security Notions for Unconditionally Secure Signature Schemes....Pages 434-449
Traitor Tracing with Constant Transmission Rate....Pages 450-465
Toward Hierarchical Identity-Based Encryption....Pages 466-481
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch....Pages 482-501
Perfectly Secure Message Transmission Revisited....Pages 502-517
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis....Pages 518-533
Security Flaws Induced by CBC Padding — Applications to SSL, IPSEC, WTLS.......Pages 534-545