default search action
CT-RSA 2003: San Francisco, CA, USA
- Marc Joye:
Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings. Lecture Notes in Computer Science 2612, Springer 2003, ISBN 3-540-00847-0
Key Self-protection
- Mihir Bellare, Bennet S. Yee:
Forward-Security in Private-Key Cryptography. 1-18 - Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung:
Intrusion-Resilient Public-Key Encryption. 19-32
Message Authentication
- Kaoru Kurosawa, Tetsu Iwata:
TMAC: Two-Key CBC MAC. 33-49 - Douglas L. Whiting, Michael J. Sabin:
Montgomery Prime Hashing for Message Authentication. 50-67
Digital Signatures
- Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim:
An Analysis of Proxy Signatures: Is a Secure Channel Necessary? 68-79 - Steven D. Galbraith, Wenbo Mao:
Invisibility and Anonymity of Undeniable and Confirmer Signatures. 80-97
Pairing Based Cryptography
- Dan Boneh, Ilya Mironov, Victor Shoup:
A Secure Signature Scheme from Bilinear Maps. 98-110 - Nigel P. Smart:
Access Control Using Pairing Based Cryptography. 111-121
Multivariate and Lattice Problems
- Jeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte:
NTRUSIGN: Digital Signatures Using the NTRU Lattice. 122-140 - Nicolas T. Courtois, Jacques Patarin:
About the XL Algorithm over GF(2). 141-157
Cryptographic Architectures
- Guido Bertoni, Jorge Guajardo, Sandeep S. Kumar, Gerardo Orlando, Christof Paar, Thomas J. Wollinger:
Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications. 158-175 - Lu Xiao, Howard M. Heys:
Hardware Performance Characterization of Block Cipher Structures. 176-192
New RSA-based Cryptosystems
- Xuhua Ding, Gene Tsudik:
Simple Identity-Based Cryptography with Mediated RSA. 193-210 - John Malone-Lee, Wenbo Mao:
Two Birds One Stone: Signcryption Using RSA. 211-225
Invited Talk I
- Thomas A. Berson:
Cryptography after the Bubble: How to Make an Impact on the World. 226
Chosen-Ciphertext Security
- Seungjoo Kim, Masahiro Mambo, Yuliang Zheng:
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. 227-243 - Bodo Möller:
Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes. 244-262
Broadcast Encryption and PRF Sharing
- Paolo D'Arco, Douglas R. Stinson:
Fault Tolerant and DistributedBroadcast Encryption. 263-280 - Huaxiong Wang, Josef Pieprzyk:
Shared Generation of Pseudo-Random Functions with Cumulative Maps. 281-294
Authentication Structures
- Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, Robert F. Cohen:
Authenticated Data Structures for Graph and Geometric Searching. 295-313 - Markus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo:
Fractal Merkle Tree Representation and Traversal. 314-326
Invited Talk II
- Adi Shamir:
RSA Shortcuts. 327
Elliptic Curves and Pairings
- Katsuyuki Okeya, Tsuyoshi Takagi:
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. 328-342 - Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery:
Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. 343-354
Threshold Cryptography
- Shouhuai Xu, Ravi S. Sandhu:
Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. 355-372 - Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol. 373-390
Implementation Issues
- Colin D. Walter:
Seeing through MIST Given a Small Fraction of an RSA Private Key. 391-402 - Claude Crépeau, Alain Slakmon:
Simple Backdoors for RSA Key Generation. 403-416
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.