Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project
CRYPTO 2003:
Santa Barbara,
California,
USA
Dan Boneh
(Ed.):
Advances in Cryptology - CRYPTO 2003, 23rd Annual International
Cryptology Conference, Santa Barbara, California, USA, August 17-21,
2003, Proceedings.
Lecture Notes in Computer Science 2729 Springer 2003, ISBN 3-540-40674-3
BibTeX
Sponsored by the
International Association for Cryptologic Research (IACR)
in cooperation with
IEEE Computer Society Technical Committee on Security and Privacy,
Computer Science Department, University of California, Santa Barbara
General Chair
Greg Rose, Qualcomm Australia
Program Chair
Dan Boneh,
Stanford University, USA
Program Committee
| Mihir Bellare | ..... | U.C. San Diego, USA |
| Jan Camenisch | ..... | IBM Research, Zurich |
| Don Coppersmith | ..... | IBM Research, Watson, USA |
| Jean-Sebastien Coron | ..... | Gemplus Card International, France |
| Ronald Cramer | ..... | BRICS, Denmark |
| Antoine Joux | ..... | DCSSI Crypto Lab, France |
| Charanjit Jutla | ..... | IBM Research, Watson, USA |
| Jonathan Katz | ..... | University of Maryland, USA |
| Eyal Kushilevitz | ..... | Technion, Israel |
| Anna Lysyanskaya | ..... | Brown University, USA |
| Phil MacKenzie | ..... | Bell Labs, USA |
| Mitsuru Matsui | ..... | Mitsubishi Electric, Japan |
| Tatsuaki Okamoto | ..... | NTT, Japan |
| Rafail Ostrovsky | ..... | Telcordia Technologies, USA |
| Benny Pinkas | ..... | HP Labs, USA |
| Bart Preneel | ..... | Katholieke Universiteit Leuven, Belgium |
| Tal Rabin | ..... | IBM Research, Watson, USA |
| Kazue Sako | ..... | NEC, Japan |
| Victor Shoup | ..... | NYU, USA |
| Jessica Staddon | ..... | PARC, USA |
| Ramarathnam Venkatesan | ..... | Microsoft Research, USA |
| Michael Wiener | ..... | Canada |
Advisory Members
Moti Yung (Crypto 2002 Program Chair), Columbia University, USA
Matthew Franklin (Crypto 2004 Program Chair), U.C. Davis, USA
TABLE OF CONTENTS
Public Key Cryptanalysis I
Alternate Adversary Models
Invited Talk I
Protocols
Symmetric Key Cryptanalysis I
Public Key Cryptanalysis II
Universal Composability
Zero-Knowledge
Algebraic Geometry
Public Key Constructions
Invited Talk II
New Problems
Symmetric Key Constructions
New Models
Symmetric Key Cryptanalysis II