Advances in Cryptology – EUROCRYPT 2002 -

Advances in Cryptology – EUROCRYPT 2002

International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings

Lars Knudsen (Herausgeber)

Buch | Softcover
XII, 552 Seiten
2002 | 2002
Springer Berlin (Verlag)
978-3-540-43553-2 (ISBN)
106,99 inkl. MwSt
YouarereadingtheproceedingsofEUROCRYPT2002,the21stannualEu- cryptconference. TheconferencewassponsoredbytheIACR,theInternational AssociationofCryptologicResearch, www. iacr. org,thisyearincooperation withtheCodingandCryptogroupattheTechnicalUniversityofEindhovenin TheNetherlands. TheGeneralChair,BerrySchoenmakers,wasresponsiblefor thelocalorganization,andtheconferenceregistrationwashandledbytheIACR SecretariatattheUniversityofCalifornia,SantaBarbara,USA. IthankBerry Schoenmakersforallhisworkandforthepleasantcollaboration. Atotalof122papersweresubmittedofwhich33wereacceptedforpres- tationattheconference. Oneofthepapersisaresultofamergeroftwosubm- sions. Threeadditionalsubmissionswerewithdrawnbytheauthorsshortlyafter thesubmissiondeadline. TheprogramalsolistsinvitedtalksbyJoanDaemen andVincentRijmen( AESandtheWideTrailStrategy )andStephenKent ( RethinkingPKI:What sTrustGotToDowithIt? ). Also,therewasarump (recentresults)session,whichHenkvanTilborgkindlyagreedtochair. Thereviewingprocesswasachallengingtaskandmanygoodsubmissionshad toberejected. Eachpaperwasreviewedbyatleastthreemembersoftheprogram committee,andpapersco-authoredbyamemberofthecommitteewerereviewed byatleast?veothermembers. Inmostcasesextensivecommentswerepassed ontotheauthors. Itwasapleasureformetoworkwiththeprogramcommittee, whosemembersallworkedveryhardoverseveralmonths. Thereviewingprocess was?nalizedwithameetinginCopenhagen,onJanuary13th,2002. Iamverygratefultothemanyadditionalreviewerswhocontributedwith theirexpertise:AdamBack,AlfredMenezes,AliceSilverberg,AntonStiglic, AntoonBosselaers,AriJuels,BarryTrager,CarloBlundo,ChanSupPark, ChongHeeKim,ChristianPaquin,ChristopheDeCanni`ere,CraigGentry,Dae HyunYum,DanBernstein,DarioCatalano,DavidPointcheval,DavidWagner, DongJinPark,DorianGoldfeld,ElianeJaulmes,EmmanuelBresson,Florian Hess,FrederikVercauteren,Fr ed ericL egar e,Fr ed ericValette,GlennDurfee, GuillaumePoupard,GwenaelleMartinet,HanPilKim,HeinRoehrig,Hovav Shacham,IlyaMironov,JacquesStern,JaeEunKang,JanCamenisch,Jean- FrancoisRaymond,JensJensen,JesperBuusNielsen,JimHughes,JohnMalone- Lee,JonathanPoritz,JongHoonShin,KatsuyukiTakashima,KazueSako, KennyPaterson,KyungWeonKim,LeoReyzin,LouisGranboulan,LouisS- vail,Markku-JuhaniO. Saarinen,MattRobshaw,MichaelQuisquater,Michael Waidner,MichelMitton,MikeSzydlo,MikeWiener,MotiYung,OlivierB- dron,OmerReingold,PaulDumais,PaulKocher,PhilippeChose,Philippe Golle,Pierre-AlainFouque,RanCanetti,RichardJozsa,RonaldCramer,Sang GyooSim,SangJinLee,SergeFehr,ShirishAltekar,SimonBlackburn,Stefan Wolf,StevenGalbraith,SvetlaNikova,TaeGuKim,TalMalkin,TalRabin, TetsuIwata,ToshioHasegawa,TsuyoshiNishioka,VirgilGligor,WenboMao, YeonKyuPark,YiqunLisaYin,YongHoHwang,YuvalIshai. VI Myworkasprogramchairwasmadealoteasierbytheelectronicsubm- sionsoftwarewrittenbyChanathipNamprempreforCrypto2000withmod- cationsbyAndreAdelsbachforEurocrypt2001,andbythereviewingsoftware developedandwrittenbyBartPreneel,WimMoreau,andJorisClaessensfor Eurocrypt2000. IwouldliketothankOledaSilvaSmithforsettingupallthis softwarelocallyandforthehelpwiththeproblemsIencountered. Iamalso gratefultoWimMoreauandChanathipNamprempreforsolvingsomeofthe problemswehadwiththesoftware. OnbehalfofthegeneralchairIwouldliketoextendmygratitudetothe membersofthelocalorganizingcommitteeatTUEindhoven,inparticularto PeterRoelseandGergelyAlp ar. For?nancialsupportoftheconferencethe- ganizingcommitteegratefullyacknowledgesthisyear ssponsors:PhilipsSe- conductorsCryptologyCompetenceCenter,MitsubishiElectricCorporation,cv cryptovision,Cryptomathic,ERCIM,CMG,Sectra,EUFORCE,andEIDMA. Finally,athank-yougoestoallwhosubmittedpaperstothisconferenceand lastbutnotleasttomyfamilyfortheirloveandunderstanding. February2002 LarsKnudsen EUROCRYPT2002 April28 May2,2002,Amsterdam,TheNetherlands Sponsoredbythe InternationalAssociationofCryptologicResearch(IACR) incooperationwith TheCodingandCryptogroupattheTechnicalUniversity ofEindhoveninTheNetherlands GeneralChair BerrySchoenmakers,DepartmentofMathe

Cryptanalysis I.- Cryptanalysis of a Pseudorandom Generator Based on Braid Groups.- Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups.- Extending the GHS Weil Descent Attack.- Public-Key Encryption.- Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption.- Key-Insulated Public Key Cryptosystems.- On the Security of Joint Signature and Encryption.- Invited Talk.- AES and the Wide Trail Design Strategy.- Information Theory & New Models.- Indistinguishability of Random Systems.- How to Fool an Unbounded Adversary with a Short Key.- Cryptography in an Unbounded Computational Model.- Implementational Analysis.- Performance Analysis and Parallel Implementation of Dedicated Hash Functions.- Fault Injection and a Timing Channel on an Analysis Technique.- Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms.- Stream Ciphers.- Fast Correlation Attacks: An Algorithmic Point of View.- BDD-Based Cryptanalysis of Keystream Generators.- Linear Cryptanalysis of Bluetooth Stream Cipher.- Digital Signatures I.- Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups.- Optimal Security Proofs for PSS and Other Signature Schemes.- Cryptanalysis II.- Cryptanalysis of SFLASH.- Cryptanalysis of the Revised NTRU Signature Scheme.- Key Exchange.- Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions.- Universally Composable Notions of Key Exchange and Secure Channels.- On Deniability in Quantum Key Exchange.- Modes of Operation.- A Practice-Oriented Treatment of Pseudorandom Number Generators.- A Block-Cipher Mode of Operation for Parallelizable Message Authentication.- Invited Talk.- Rethinking PKI: What's Trust Got to Do with It?.-Digital Signatures II.- Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods.- From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.- Security Notions for Unconditionally Secure Signature Schemes.- Traitor Tracking & Id-Based Encryption.- Traitor Tracing with Constant Transmission Rate.- Toward Hierarchical Identity-Based Encryption.- Multiparty and Multicast.- Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch.- Perfectly Secure Message Transmission Revisited.- Symmetric Cryptology.- Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis.- Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS....

Erscheint lt. Verlag 17.4.2002
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XII, 552 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 780 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Algorithm analysis and problem complexity • Cryoptography • Cryptoanalysis • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Data Security • DES • Digital Payment • Digital Signatures • Electronic Commerce • Encryption • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Information Security • Information Theory • Kryptologie • privacy • Security Networks • Systems Security
ISBN-10 3-540-43553-0 / 3540435530
ISBN-13 978-3-540-43553-2 / 9783540435532
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich