Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of pkc 2003
Page
Title
1-17
Efficient Construction of (Distributed) Verifiable Random Functions
18-30
An Identity-Based Signature from Gap Diffie-Hellman Groups
31-46
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
47-61
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
62-70
On the Bit Security of NTRUEncrypt
71-84
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks
85-99
Randomness Re-use in Multi-recipient Encryption Schemeas
100-115
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
116-129
The Cramer-Shoup Strong-RSASignature Scheme Revisited
130-144
Strong Key-Insulated Signature Schemes
145-160
A Verifiable Secret Shuffle of Homomorphic Encryptions
161-174
Round-Optimal Contributory Conference Key Agreement
175-186
Security Analysis of the MOR Cryptosystem
187-198
A Practical Attack on Some Braid Group Based Cryptographic Primitives
199-210
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
211-223
Validation of Elliptic Curve Public Keys
224-239
Exceptional Procedure Attack on Elliptic Curve Cryptosystems
240-253
On Montgomery-Like Representationsfor Elliptic Curves over GF(2
k
)
254-266
A Dedicated Sieving Hardware
267-278
A Fast and Secure Implementation of Sflash
279-291
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
292-308
A Lattice Based Public Key Cryptosystem Using Polynomial Representations
309-323
The Security of DSA and ECDSA
324-336
Side-Channel Attacks on Textbook RSA and ElGamal Encryption
337-350
On the Security of HFE, HFEv- and Quartz
351-364
Generic Attacks and the Security of Quartz