This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2002, held in Amsterdam, The Netherlands, in April/May 2002.
The 33 revised full papers presented were carefully reviewed and selected from a total of 122 submissions. The papers are organized in topical sections on cryptanalysis, public-key encryption, information theory and new models, implementational analysis, stream ciphers, digital signatures, key exchange, modes of operation, traitor tracing and id-based encryption, multiparty and multicast, and symmetric cryptology.
Author(s): Rosario Gennaro, Daniele Micciancio (auth.), Lars R. Knudsen (eds.)
Series: Lecture Notes in Computer Science 2332
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2002
Language: English
Pages: 552
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems; Computer Communication Networks; Operating Systems
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups....Pages 1-13
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups....Pages 14-28
Extending the GHS Weil Descent Attack....Pages 29-44
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption....Pages 45-64
Key-Insulated Public Key Cryptosystems....Pages 65-82
On the Security of Joint Signature and Encryption....Pages 83-107
AES and the Wide Trail Design Strategy....Pages 108-109
Indistinguishability of Random Systems....Pages 110-132
How to Fool an Unbounded Adversary with a Short Key....Pages 133-148
Cryptography in an Unbounded Computational Model....Pages 149-164
Performance Analysis and Parallel Implementation of Dedicated Hash Functions....Pages 165-180
Fault Injection and a Timing Channel on an Analysis Technique....Pages 181-196
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms....Pages 197-208
Fast Correlation Attacks: An Algorithmic Point of View....Pages 209-221
BDD-Based Cryptanalysis of Keystream Generators....Pages 222-237
Linear Cryptanalysis of Bluetooth Stream Cipher....Pages 238-255
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups....Pages 256-271
Optimal Security Proofs for PSS and Other Signature Schemes....Pages 272-287
Cryptanalysis of SFLASH....Pages 288-298
Cryptanalysis of the Revised NTRU Signature Scheme....Pages 299-320
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions....Pages 321-336
Universally Composable Notions of Key Exchange and Secure Channels....Pages 337-351
On Deniability in Quantum Key Exchange....Pages 352-367
A Practice-Oriented Treatment of Pseudorandom Number Generators....Pages 368-383
A Block-Cipher Mode of Operation for Parallelizable Message Authentication....Pages 384-397
Rethinking PKI: What’s Trust Got to Do with It?....Pages 398-399
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods....Pages 400-417
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security....Pages 418-433
Security Notions for Unconditionally Secure Signature Schemes....Pages 434-449
Traitor Tracing with Constant Transmission Rate....Pages 450-465
Toward Hierarchical Identity-Based Encryption....Pages 466-481
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch....Pages 482-501
Perfectly Secure Message Transmission Revisited....Pages 502-517
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis....Pages 518-533
Security Flaws Induced by CBC Padding — Applications to SSL, IPSEC, WTLS.......Pages 534-545