


default search action
CT-RSA 2003: San Francisco, CA, USA
- Marc Joye:

Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings. Lecture Notes in Computer Science 2612, Springer 2003, ISBN 3-540-00847-0
Key Self-protection
- Mihir Bellare, Bennet S. Yee:

Forward-Security in Private-Key Cryptography. 1-18 - Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji

, Moti Yung:
Intrusion-Resilient Public-Key Encryption. 19-32
Message Authentication
- Kaoru Kurosawa, Tetsu Iwata:

TMAC: Two-Key CBC MAC. 33-49 - Douglas L. Whiting, Michael J. Sabin:

Montgomery Prime Hashing for Message Authentication. 50-67
Digital Signatures
- Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim

:
An Analysis of Proxy Signatures: Is a Secure Channel Necessary? 68-79 - Steven D. Galbraith, Wenbo Mao:

Invisibility and Anonymity of Undeniable and Confirmer Signatures. 80-97
Pairing Based Cryptography
- Dan Boneh, Ilya Mironov, Victor Shoup:

A Secure Signature Scheme from Bilinear Maps. 98-110 - Nigel P. Smart:

Access Control Using Pairing Based Cryptography. 111-121
Multivariate and Lattice Problems
- Jeffrey Hoffstein

, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte:
NTRUSIGN: Digital Signatures Using the NTRU Lattice. 122-140 - Nicolas T. Courtois, Jacques Patarin:

About the XL Algorithm over GF(2). 141-157
Cryptographic Architectures
- Guido Bertoni

, Jorge Guajardo, Sandeep S. Kumar, Gerardo Orlando, Christof Paar, Thomas J. Wollinger:
Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications. 158-175 - Lu Xiao, Howard M. Heys

:
Hardware Performance Characterization of Block Cipher Structures. 176-192
New RSA-based Cryptosystems
- Xuhua Ding

, Gene Tsudik:
Simple Identity-Based Cryptography with Mediated RSA. 193-210 - John Malone-Lee, Wenbo Mao:

Two Birds One Stone: Signcryption Using RSA. 211-225
Invited Talk I
- Thomas A. Berson:

Cryptography after the Bubble: How to Make an Impact on the World. 226
Chosen-Ciphertext Security
- Seungjoo Kim

, Masahiro Mambo, Yuliang Zheng
:
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. 227-243 - Bodo Möller:

Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes. 244-262
Broadcast Encryption and PRF Sharing
- Paolo D'Arco, Douglas R. Stinson:

Fault Tolerant and DistributedBroadcast Encryption. 263-280 - Huaxiong Wang, Josef Pieprzyk

:
Shared Generation of Pseudo-Random Functions with Cumulative Maps. 281-294
Authentication Structures
- Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, Robert F. Cohen:

Authenticated Data Structures for Graph and Geometric Searching. 295-313 - Markus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo:

Fractal Merkle Tree Representation and Traversal. 314-326
Invited Talk II
- Adi Shamir:

RSA Shortcuts. 327
Elliptic Curves and Pairings
- Katsuyuki Okeya, Tsuyoshi Takagi:

The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. 328-342 - Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery:

Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. 343-354
Threshold Cryptography
- Shouhuai Xu, Ravi S. Sandhu:

Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. 355-372 - Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:

Secure Applications of Pedersen's Distributed Key Generation Protocol. 373-390
Implementation Issues
- Colin D. Walter:

Seeing through MIST Given a Small Fraction of an RSA Private Key. 391-402 - Claude Crépeau, Alain Slakmon:

Simple Backdoors for RSA Key Generation. 403-416

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














