Advertisement

Topics in Cryptology — CT-RSA 2002

The Cryptographers’ Track at the RSA Conference 2002 San Jose, CA, USA, February 18–22, 2002 Proceedings

  • Bart Preneel
Conference proceedings CT-RSA 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2271)

Table of contents

  1. Front Matter
    Pages I-X
  2. Public Key Cryptography

    1. Burton S. Kaliski Jr.
      Pages 1-16
    2. Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung
      Pages 17-29
  3. Efficient Hardware Implementations

  4. Public Key Cryptography: Theory

  5. Symmetric Ciphers

    1. John Black, Phillip Rogaway
      Pages 114-130
    2. Atsuko Miyaji, Masao Nonaka, Yoshinori Takii
      Pages 131-148
  6. E-Commerce and Applications

    1. Silvio Micali, Ronald L. Rivest
      Pages 149-163
    2. Markus Jakobsson, Ari Juels, Phong Q. Nguyen
      Pages 164-181
    3. Giuseppe Ateniese, Cristina Nita-Rotaru
      Pages 182-199
  7. Digital Signatures

    1. Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson
      Pages 200-217
    2. Greg Maitland, Colin Boyd
      Pages 218-235
    3. Silvio Micali, Ronald L. Rivest
      Pages 236-243
    4. Robert Johnson, David Molnar, Dawn Song, David Wagner
      Pages 244-262
  8. Public Key Encryption

    1. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
      Pages 263-276
  9. Discrete Logarithm

  10. Back Matter
    Pages 311-311

About these proceedings

Introduction

This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers’ Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag’s Lecture Notes in Computer Science series. With 14 parallel tracks and many thousands of participants, the RSA - curity Conference is the largest e-security and cryptography conference. In this setting, the Cryptographers’ Track presents the latest scienti?c developments. The program committee considered 49 papers and selected 20 for presen- tion. One paper was withdrawn by the authors. The program also included two invited talks by Ron Rivest (“Micropayments Revisited” – joint work with Silvio Micali) and by Victor Shoup (“The Bumpy Road from Cryptographic Theory to Practice”). Each paper was reviewed by at least three program committee members; paperswrittenbyprogramcommitteemembersreceivedsixreviews.Theauthors of accepted papers made a substantial e?ort to take into account the comments intheversionsubmittedtotheseproceedings.Inalimitednumberofcases,these revisions were checked by members of the program committee. I would like to thank the 20 members of the program committee who helped to maintain the rigorous scienti?c standards to which the Cryptographers’ Track aims to adhere. They wrote thoughtful reviews and contributed to long disc- sions; more than 400 Kbyte of comments were accumulated. Many of them - tended the program committee meeting, while they could have been enjoying the sunny beaches of Santa Barbara.

Keywords

Access Control Authentication Computational Number Theory Cryptanalysis Cryptographic Protocols Cryptography Data Security Hardware Information Security Public Key Cryptosystems RSA Secure Communication cryptology

Editors and affiliations

  • Bart Preneel
    • 1
  1. 1.Department of Electrical EngineeringKatholieke Universiteit LeuvenLeuven-HeverleeBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-45760-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-43224-1
  • Online ISBN 978-3-540-45760-2
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace