


default search action
ASIACRYPT 2003: Taipei, Taiwan
- Chi-Sung Laih:

Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings. Lecture Notes in Computer Science 2894, Springer 2003, ISBN 3-540-20592-6
Public Key Cryptography I
- Duong Hieu Phan

, David Pointcheval
:
Chosen-Ciphertext Security without Redundancy. 1-18 - Kaoru Kurosawa, Tsuyoshi Takagi:

Some RSA-Based Encryption Schemes with Tight Security Reduction. 19-36 - Emmanuel Bresson, Dario Catalano, David Pointcheval

:
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. 37-54
Number Theory I
- Arjen K. Lenstra, Eran Tromer

, Adi Shamir, Wil Kortsmit, Bruce Dodson, James P. Hughes, Paul C. Leyland:
Factoring Estimates for a 1024-Bit RSA Modulus. 55-74 - Nicolas Thériault:

Index Calculus Attack for Hyperelliptic Curves of Small Genus. 75-92
Efficient Implementations
- Pradeep Kumar Mishra, Palash Sarkar:

Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves. 93-110 - Iwan M. Duursma, Hyang-Sook Lee:

Tate Pairing Implementation for Hyperelliptic Curves y2 = xp-x + d. 111-123 - David R. Kohel:

The AGM-X0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting. 124-136
Key Management and Protocols
- Miodrag J. Mihaljevic:

Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. 137-154 - SeongHan Shin, Kazukuni Kobara, Hideki Imai:

Leakage-Resilient Authenticated Key Establishment Protocols. 155-172 - Chih-Hung Wang:

Untraceable Fair Network Payment Protocols with Off-Line TTP. 173-187
Hash Functions
- Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk

, Blaise Gassend, G. Edward Suh:
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. 188-207 - Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi:

New Parallel Domain Extenders for UOWHF. 208-227 - Bart Van Rompay, Alex Biryukov

, Bart Preneel, Joos Vandewalle:
Cryptanalysis of 3-Pass HAVAL. 228-245
Group Signatures
- Giuseppe Ateniese, Breno de Medeiros:

Efficient Group Signatures without Trapdoors. 246-268 - Gene Tsudik, Shouhuai Xu:

Accumulating Composites and Improved Group Signing. 269-286 - Tatsuaki Okamoto, Jacques Stern:

Almost Uniform Density of Power Residues and the Provable Security of ESIGN. 287-301
Number Theory II
- Jason E. Gower:

Rotations and Translations of Number Field Sieve Polynomials. 302-310 - Mark L. Bauer, Safuat Hamdy:

On Class Group Computations Using the Number Field Sieve. 311-325
Invited Talk
- Hong-Sen Yan, Hsing-Hui Huang:

The Secret and Beauty of Ancient Chinese Padlocks. 326-330
Block Cipher
- Olivier Billet, Henri Gilbert:

A Traceable Block Cipher. 331-346 - Frédéric Muller:

A New Attack against Khazad. 347-358
Broadcast and Multicast
- Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee:

An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. 359-373 - Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai:

Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. 374-391
Foundations and Complexity Theory
- Jean-Sébastien Coron, David Naccache:

Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. 392-397 - Helger Lipmaa:

On Diophantine Complexity and Statistical Zero-Knowledge Arguments. 398-415 - Helger Lipmaa:

Verifiable Homomorphic Oblivious Transfer and Private Equality Test. 416-433
Public Key Cryptography II
- Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi:

Generalized Powering Functions and Their Application to Digital Signatures. 434-451 - Sattam S. Al-Riyami, Kenneth G. Paterson:

Certificateless Public Key Cryptography. 452-473 - Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi:

A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. 474-491 - Pierre-Alain Fouque

, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard:
The Insecurity of Esign in Practical Implementations. 492-506
Digital Signature
- Huaxiong Wang, Josef Pieprzyk

:
Efficient One-Time Proxy Signatures. 507-522 - Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk

:
Universal Designated-Verifier Signatures. 523-542

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














