Advances in Cryptology — CRYPTO 2001

21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001 Proceedings

  • Joe Kilian
Conference proceedings CRYPTO 2001

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2139)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Foundations

    1. Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan et al.
      Pages 1-18
    2. Ran Canetti, Marc Fischlin
      Pages 19-40
  3. Traitor Tracing

    1. Dalit Naor, Moni Naor, Jeff Lotspiech
      Pages 41-62
    2. Aggelos Kiayias, Moti Yung
      Pages 63-79
  4. Multi-party Computation

    1. Matthias Fitzi, Juan A. Garay, Ueli Maurer, Rafail Ostrovsky
      Pages 80-100
    2. Martin Hirt, Ueli Maurer
      Pages 101-118
    3. Ronald Cramer, Ivan Damgård
      Pages 119-136
  5. Two-Party Computation

  6. Elliptic Curves

    1. Robert P. Gallant, Robert J. Lambert, Scott A. Vanstone
      Pages 190-200
    2. Dan Boneh, Matt Franklin
      Pages 213-229
  7. OAEP

    1. Victor Shoup
      Pages 239-259
    2. Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
      Pages 260-274
  8. Encryption and Authentication

    1. Mihir Bellare, Alexandra Boldyreva, Lars Knudsen, Chanathip Namprempre
      Pages 292-309
  9. Signature Schemes

    1. Gene Itkis, Leonid Reyzin
      Pages 332-354
    2. Adi Shamir, Yael Tauman
      Pages 355-367
  10. Protocols

    1. Jun Furukawa, Kazue Sako
      Pages 368-387
    2. Jan Camenisch, Anna Lysyanskaya
      Pages 388-407
    3. Oded Goldreich, Yehuda Lindell
      Pages 408-432
  11. Cryptanalysis

    1. Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache
      Pages 433-439
    2. Jovan D. Golić
      Pages 440-457
  12. Applications of Groups and Codes

    1. Jung Hee Cheon
      Pages 458-469
    2. Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongtaek Chee, Choonsik Park
      Pages 470-485
    3. Eonkyung Lee, Sang Jin Lee, Sang Geun Hahn
      Pages 486-502
  13. Broadcast and Secret Sharing

    1. Ronald Cramer, Ivan Damgård, Serge Fehr
      Pages 503-523
    2. Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup
      Pages 524-541
  14. Soundness and Zero-Knowledge

    1. Silvio Micali, Leonid Reyzin
      Pages 542-565
    2. Alfredo De Santis, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano, Amit Sahai
      Pages 566-598
  15. Back Matter
    Pages 599-599

About these proceedings


Crypto 2001, the 21st Annual Crypto conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The conference received 156 submissions, of which the program committee selected 34 for presentation; one was later withdrawn. These proceedings contain the revised versions of the 33 submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program included two invited lectures. Mark Sherwin spoke on, \Quantum information processing in semiconductors: an experimentalist’s view." Daniel Weitzner spoke on, \Privacy, Authentication & Identity: A recent history of cryptographic struggles for freedom." The conference program also included its perennial \rump session," chaired by Stuart Haber, featuring short, informal talks on late{breaking research news. As I try to account for the hours of my life that ?ew o to oblivion, I realize that most of my time was spent cajoling talented innocents into spending even more time on my behalf. I have accumulated more debts than I can ever hope to repay. As mere statements of thanks are certainly insu cient, consider the rest of this preface my version of Chapter 11.


Algorithmic Number Theory Cryptanalysis Cryptographic Protocols Cryptography Data Encryption Digital Signatures Elliptic Curves Finite Field Computation Privacy Secure Networking Security Systems Security coding theory

Editors and affiliations

  • Joe Kilian
    • 1
  1. 1.Yianilos Labs.PrincetonUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-42456-7
  • Online ISBN 978-3-540-44647-7
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site