Title | Authors | Affiliations | Country |
Factoring estimates for a 1024-bit RSA modulus | Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James Hughes, Paul Leyland | Citibank, Technische Universiteit Eindhoven and Lehigh University and Storage Technology Corporation and Microsoft Research | USA |
Rotations and Translations of Number Field Sieve Polynomials | Jason E. Gower | Purdue University | USA |
Chosen-Ciphertext Security without Redundancy | Duong Hieu Phan and David Pointcheval | ENS, France and ENS, France | Fracnce |
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves | Pradeep Kumar Mishra and Palash Sarkar | Indian Statistical Institute and Indian Statistical Insititute | India |
Almost uniform density of power residues and the provable security of ESIGN | Tatsuaki Okamoto and Jacques Stern | NTT Labs and ENS | France |
Index Calculus Attack for Hyperelliptic Curves of Small Genus | Nicolas Thériault | University of Toronto | Canada |
Some RSA-based Encryption Schemes with Tight Security Reduction | Kaoru Kurosawa and Tsuyoshi Takagi | Ibaraki University and TU Darmstadt | Japan |
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption | Jean-Sebastien Coron and David Naccache | Gemplus Card International, 34 rue Guynemer, 92447 Issy-les-Moulineaux, France | France |
Efficient Group Signatures without Trapdoors | Giuseppe Ateniese and Breno de Medeiros | Johns Hopkins University and Johns Hopkins University | USA |
Efficient One-time Proxy Signatures | Huaxiong Wang and Josef Pieprzyk | Macquarie University, Australia and Macquarie University, Australia | Australia |
Universal Designated-Verifier Signatures | Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef Pieprzyk | Macquarie University and Monash University and Macquarie University and Macquarie University | Australia |
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack | Chong Hee Kim and Yong Ho Hwang and Pil Joong Lee | Pohang University of Science and Technology | Korea |
A New Attack Against Khazad | Frédéric Muller | DCSSI Crypto Lab | France |
On Diophantine Complexity and Statistical Zero-Knowledge Arguments | Helger Lipmaa | Helsinki University of Technology | Finland |
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications | Emmanuel Bresson and Dario Catalano and David Pointcheval | CELAR and ENS and ENS | France |
Generalized Powering Functions and their Application to Digital Signatures | Hisayoshi Sato and Tsuyoshi Takagi and Satoru Tezuka and Kazuo Takaragi | Hitachi and TU Darmstadt and Hitachi and Hitachi | Germany |
Certificateless Public Key Cryptography | S.S. Al-Riyami and K.G. Paterson | Information Security Group, Royal Holloway University of London | United Kingdom |
A Traceable Block Cipher | Olivier Billet and Henri Gilbert | France Telecom R&D | France |
A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems | Tsuyoshi Takagi and Katja Schmidt-Samoa and Kaoru Kurosawa | Technische Universitat Darmstadt, Fachbereich Informatik, Alexanderstrasse 10, D-64283 Darmstadt, Germany; Ibaraki University, 4-12-1 Nakanarusawa, Hitachi, Ibaraki, 316-8511, Japan | Germany |
Cryptanalysis of 3-pass HAVAL | Bart Van Rompay and Bart Preneel and Joos Vandewalle and Alex Biryukov | Katholieke Universiteit Leuven ESAT/SCD-COSIC | Beligium |
Verifiable Homomorphic Oblivious Transfer and Private Equality Test | Helger Lipmaa | Helsinki University of Technology | Finland |
Tate-pairing implementation for the hyperelliptic curves y2 = xp - x + d | Iwan Duursma and Hyang-Sook Lee | Department of Mathematics, University of Illinois at Urbana-Champaign and Department of Mathematics, Ewha Womans University | Korea |
On Class Group Computations Using the Number Field Sieve | Mark L. Bauer and Safuat Hamdy | University of Waterloo and University of Calgary | Canada |
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking | Dwaine Clarke and Srinivas Devadas and Marten van Dijk and Blaise Gassend and G. Edward Suh | MIT Laboratory for Computer Science | USA |
Accumulating Composites and Improved Group Signing | Gene Tsudik and Shouhuai Xu | Department of Information and Computer Science, UC Irvine | USA |
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy | Miodrag J. Mihaljević | Mathematical Institute, Serbian Academy of Sciences and Arts, Belgrade | Yugoslavia |
The AGM-X0(N) Heegner point lifting algorithm and elliptic curve point counting | David R. Kohel | University of Sydney | Australia |
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes | Nuttapong Attrapadung and Kazukuni Kobara and Hideki Imai | Imai Laboratory, Institute of Industrial Science, University of Tokyo | Japan |
Leakage-Resilient Authenticated Key Establishment Protocols | SeongHan Shin and Kazukuni Kobara and Hideki Imai | Institute of Industrial Science, The University of Tokyo, Japan | Japan |
The Insecurity of Esign in Practical Implementations | Pierre-Alain Fouque and Gwenaëlle Martinet and Guillaume Poupard and Nick Howgrave-Graham | DCSSI Crypto Lab | France |
Untraceable Fair Network Payment Protocols with Off-line TTP | Chih-Hung Wang | Department of Computer Science and Information Engineering | Taiwan |
New Parallel Domain Extenders for UOWHF | Wonil Lee and Donghoon Chang and Sangjin Lee and Soohak Sung and Mridul Nandi | Korea University and Paichai University and Applied Statistical Unit in Indian Statistical Institute | Korea, India |