© 2002

Advances in Cryptology — ASIACRYPT 2002

8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings

  • Yuliang Zheng
Conference proceedings ASIACRYPT 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2501)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer
    Pages 1-26
  3. Wieb Bosma, James Hutton, Eric R. Verheul
    Pages 46-63
  4. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
    Pages 81-99
  5. Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu
    Pages 110-124
  6. Dowon Hong, Ku-Young Chang, Heuisu Ryu
    Pages 143-159
  7. Elad Barkan, Eli Biham
    Pages 160-175
  8. Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim
    Pages 176-191
  9. Jonathan Katz, Moti Yung
    Pages 192-205
  10. Masayuki Abe, Ronald Cramer, Serge Fehr
    Pages 206-224
  11. K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan
    Pages 224-242
  12. Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung
    Pages 243-253
  13. Eli Biham, Orr Dunkelman, Nathan Keller
    Pages 254-266
  14. Nicolas T. Courtois, Josef Pieprzyk
    Pages 267-287
  15. Alexander Klimov, Anton Mityagin, Adi Shamir
    Pages 288-298
  16. Dario Catalano, Phong Q. Nguyen, Jacques Stern
    Pages 299-310

About these proceedings


This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.


Authentication Boolean function Cryptanalysis Cryptographic Attacks Cryptology Cryptosystems Digital Signature Systems Key Exchange Protocols Public Key Cryptography Secure Multiparty Computation cryptography data security information security

Editors and affiliations

  • Yuliang Zheng
    • 1
  1. 1.Department of Software and Information SystemsUniversity of North Carolina at CharlotteCharlotteUSA

Bibliographic information