year |
venue |
title |
pages |
2003 | asiacrypt | Index Calculus Attack for Hyperelliptic Curves of Small Genus | online |
2003 | asiacrypt | Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption | online |
2003 | asiacrypt | The AGM-X0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting | online |
2003 | asiacrypt | Accumulating Composites and Improved Group Signing | online |
2003 | asiacrypt | Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings | online |
2003 | asiacrypt | A Traceable Block Cipher | online |
2003 | asiacrypt | Untraceable Fair Network Payment Protocols with Off-Line TTP | online |
2003 | asiacrypt | Efficient One-Time Proxy Signatures | online |
2003 | asiacrypt | A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems | online |
2003 | asiacrypt | Some RSA-Based Encryption Schemes with Tight Security Reduction | online |
2003 | asiacrypt | The Secret and Beauty of Ancient Chinese Padlocks | online |
2003 | asiacrypt | A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications | online |
2003 | asiacrypt | Certificateless Public Key Cryptography | online |
2003 | asiacrypt | New Parallel Domain Extenders for UOWHF | online |
2003 | asiacrypt | Efficient Group Signatures without Trapdoors | online |
2003 | asiacrypt | Factoring Estimates for a 1024-Bit RSA Modulus | online |
2003 | asiacrypt | Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes | online |
2003 | asiacrypt | On Diophantine Complexity and Statistical Zero-Knowledge Arguments | online |
2003 | asiacrypt | Almost Uniform Density of Power Residues and the Provable Security of ESIGN | online |
2003 | asiacrypt | Verifiable Homomorphic Oblivious Transfer and Private Equality Test | online |
2003 | asiacrypt | On Class Group Computations Using the Number Field Sieve | online |
2003 | asiacrypt | Chosen-Ciphertext Security without Redundancy | online |
2003 | asiacrypt | Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking | online |
2003 | asiacrypt | Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy | online |
2003 | asiacrypt | Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves | online |
2003 | asiacrypt | Cryptanalysis of 3-Pass HAVAL | online |
2003 | asiacrypt | Tate Pairing Implementation for Hyperelliptic Curves y2 = xp-x + d | online |
2003 | asiacrypt | The Insecurity of Esign in Practical Implementations | online |
2003 | asiacrypt | A New Attack against Khazad | online |
2003 | asiacrypt | Generalized Powering Functions and Their Application to Digital Signatures | online |
2003 | asiacrypt | Leakage-Resilient Authenticated Key Establishment Protocols | online |
2003 | asiacrypt | Rotations and Translations of Number Field Sieve Polynomials | online |
2003 | asiacrypt | An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack | online |
2003 | asiacrypt | Universal Designated-Verifier Signatures | online |
2003 | asiacrypt | Cryptography: State of the Science | |
2003 | ches | An Analysis of Goubin's Refined Power Analysis Attack | 281-290 |
2003 | ches | The Security Challenges of Ubiquitous Computing | 1 |
2003 | ches | Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs | 334-350 |
2003 | ches | Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology | 125-136 |
2003 | ches | Cryptanalysis of DES Implemented on Computers with Cache | 62-76 |
2003 | ches | RSA Security Analysis | |
2003 | ches | Algebraic Structures in the Design of AES - Cryptographically Strong or Risky? | |
2003 | ches | Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings | online |
2003 | ches | Multi-channel Attacks | 2-16 |
2003 | ches | Security Evaluation of Asynchronous Circuits | 137-151 |
2003 | ches | Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems | 366-381 |
2003 | ches | True Random Number Generators Secure in a Changing Environment | 166-180 |
2003 | ches | A New Type of Timing Attack: Application to GPS | 291-303 |
2003 | ches | Faster Double-Size Modular Multiplication from Euclidean Multipliers | 214-227 |
2003 | ches | Very Compact FPGA Implementation of the AES Algorithm | 319-333 |
2003 | ches | A Practical Countermeasure against Address-Bit Differential Power Analysis | 382-396 |
2003 | ches | On the Security of PKCS#11 | 411-425 |
2003 | ches | GCD-Free Algorithms for Computing Modular Inverses | 243-253 |
2003 | ches | A New Algorithm for Switching from Arithmetic to Boolean Masking | 89-97 |
2003 | ches | Efficient Modular Reduction Algorithm in IFq[x] and Its Application to "Left to Right" Modular Multiplication in IF2[x] | 203-213 |
2003 | ches | How to Predict the Output of a Hardware Random Number Generator | 181-188 |
2003 | ches | Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts | 152-165 |
2003 | ches | Hidden Markov Model Cryptoanalysis | 17-34 |
2003 | ches | Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers | 113-124 |
2003 | ches | Attacking RSA-Based Sessions in SSL/TLS | 426-440 |
2003 | ches | Attacking Unbalanced RSA-CRT Using SPA | 254-268 |
2003 | ches | The Doubling Attack - Why Upwards Is Better than Downwards | 269-280 |
2003 | ches | Hardware to Solve Sparse Systems of Linear Equations over GF(2) | 51-61 |
2003 | ches | Efficient Exponentiation for a Class of Finite Fields GF(2 n) Determined by Gauss Periods | 228-242 |
2003 | ches | DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits | 98-112 |
2003 | ches | A More Flexible Countermeasure against Side Channel Attacks Using Window Method | 397-410 |
2003 | ches | Power-Analysis Attacks on an FPGA - First Experimental Results | 35-50 |
2003 | ches | Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves | 351-365 |
2003 | ches | A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD | 77-88 |
2003 | ches | On Low Complexity Bit Parallel Polynomial Basis Multipliers | 189-202 |
2003 | ches | Unified Hardware Architecture for 128-Bit Block Ciphers AES and Camellia | 304-318 |
2003 | crypto | Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases | online |
2003 | crypto | On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model | online |
2003 | crypto | The Impact of Decryption Failures on the Security of NTRU Encryption | online |
2003 | crypto | Practical Verifiable Encryption and Decryption of Discrete Logarithms | online |
2003 | crypto | On Cryptographic Assumptions and Challenges | online |
2003 | crypto | Relaxing Chosen-Ciphertext Security | online |
2003 | crypto | Universal Composition with Joint State | online |
2003 | crypto | Password Interception in a SSL/TLS Channel | online |
2003 | crypto | A Message Authentication Code Based on Unimodular Matrix Groups | online |
2003 | crypto | Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) | online |
2003 | crypto | Making a Faster Cryptanalytic Time-Memory Trade-Off | online |
2003 | crypto | A Tweakable Enciphering Mode | online |
2003 | crypto | Cryptanalysis of SAFER++ | online |
2003 | crypto | Primality Proving via One Round in ECPP and One Iteration in AKS | online |
2003 | crypto | A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem | online |
2003 | crypto | Plaintext Awareness via Key Registration | online |
2003 | crypto | On Deniability in the Common Reference String and Random Oracle Model | online |
2003 | crypto | Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security | online |
2003 | crypto | Weak Key Authenticity and the Computational Completeness of Formal Encryption | online |
2003 | crypto | Lower and Upper Bounds on Obtaining History Independence | online |
2003 | crypto | Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings | online |
2003 | crypto | New Partial Key Exposure Attacks on RSA | online |
2003 | crypto | Extending Oblivious Transfers Efficiently | online |
2003 | crypto | Private Circuits: Securing Hardware against Probing Attacks | online |
2003 | crypto | Fast Algebraic Attacks on Stream Ciphers with Linear Feedback | online |
2003 | crypto | Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret | online |
2003 | crypto | Torus-Based Cryptography | online |
2003 | crypto | Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation | online |
2003 | crypto | Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption | online |
2003 | crypto | Algebraic Attacks on Combiners with Memory | online |
2003 | crypto | Factoring Large Number with the TWIRL Device | online |
2003 | crypto | SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols | online |
2003 | crypto | Derandomization in Cryptography | online |
2003 | crypto | Scalable Protocols for Authenticated Group Key Exchange | online |
2003 | crypto | Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication | online |
2003 | crypto | On Memory-Bound Functions for Fighting Spam | online |
2003 | crypto | Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More | online |
2003 | eprint | Isomorphism Classes of Picard Curves over Finite Fields | online |
2003 | eprint | Hidden Polynomial Cryptosystems | online |
2003 | eprint | Extending Joux's Protocol to Multi Party Key Agreement | online |
2003 | eprint | Initiator-Resilient Universally Composable Key Exchange | online |
2003 | eprint | On the Optimality of Linear, Differential and Sequential Distinguishers | online |
2003 | eprint | Hash Function Balance and its Impact on Birthday Attacks | online |
2003 | eprint | Forking Lemmas in the Ring Signatures' Scenario | online |
2003 | eprint | On the Security of Some Proxy Signature Schemes | online |
2003 | eprint | EAX: A Conventional Authenticated-Encryption Mode | online |
2003 | eprint | A Critique of CCM | online |
2003 | eprint | How to Protect Against a Militant Spammer | online |
2003 | eprint | Proxy Blind Signature Scheme | online |
2003 | eprint | A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures | online |
2003 | eprint | Divisible Voting Scheme | online |
2003 | eprint | Almost Security of Cryptographic Boolean Functions | online |
2003 | eprint | Goldbach?s Conjecture on ECDSA Protocols | online |
2003 | eprint | An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem | online |
2003 | eprint | Relation among simulator-based and comparison-based definitions of semantic security | online |
2003 | eprint | Fast arithmetic on Jacobians of Picard curves | online |
2003 | eprint | Non-interactive and Reusable Non-malleable Commitment Schemes | online |
2003 | eprint | Primitive Specification for SOBER-128 | online |
2003 | eprint | Stronger Security Bounds for OMAC, TMAC and XCBC | online |
2003 | eprint | A Forward-Secure Public-Key Encryption Scheme | online |
2003 | eprint | Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem | online |
2003 | eprint | A defect of the implementation schemes of the TTM cryptosystem | online |
2003 | eprint | On the Selection of Pairing-Friendly Groups | online |
2003 | eprint | A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack | online |
2003 | eprint | Elliptic Curve Point Multiplication | online |
2003 | eprint | A Structured Multisignature Scheme from the Gap Diffie-Hellman Group | online |
2003 | eprint | Sequential Aggregate Signatures from Trapdoor Permutations | online |
2003 | eprint | Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol | online |
2003 | eprint | Simple Stateless Steganography | online |
2003 | eprint | Trace Zero Subvariety for Cryptosystems | online |
2003 | eprint | Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack | online |
2003 | eprint | Secure Proxy Signature Schemes for Delegation of Signing Rights | online |
2003 | eprint | Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves | online |
2003 | eprint | Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format | online |
2003 | eprint | Algorithms in Braid Groups | online |
2003 | eprint | Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model | online |
2003 | eprint | Cryptanalysis of HFE | online |
2003 | eprint | Length-Based Attacks for Certain Group Based Encryption Rewriting Systems | online |
2003 | eprint | Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols | online |
2003 | eprint | New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing | online |
2003 | eprint | On Diophantine Complexity and Statistical Zero-Knowledge Arguments | online |
2003 | eprint | CWC: A high-performance conventional authenticated encryption mode | online |
2003 | eprint | Fujisaki-Okamoto IND-CCA hybrid encryption revisited | online |
2003 | eprint | Novel Cyclic and Algebraic Properties of AES | online |
2003 | eprint | Crytanalysis of SAFER++ | online |
2003 | eprint | Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key | online |
2003 | eprint | Further Cryptanalysis of some Proxy Signature Schemes | online |
2003 | eprint | Accumulating Composites and Improved Group Signing | online |
2003 | eprint | Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings | online |
2003 | eprint | Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions | online |
2003 | eprint | Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols | online |
2003 | eprint | A New ID-based Group Signature Scheme from Bilinear Pairings | online |
2003 | eprint | An identity-based ring signature scheme from bilinear pairings | online |
2003 | eprint | Visual Crypto Displays Enabling Secure Communications | online |
2003 | eprint | How Secure Are FPGAs in Cryptographic Applications? | online |
2003 | eprint | Physically Observable Cryptography | online |
2003 | eprint | A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol | online |
2003 | eprint | Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols | online |
2003 | eprint | Assessing security of some group based cryptosystems | online |
2003 | eprint | A General Correlation Theorem | online |
2003 | eprint | Algebraic Attacks on Combiners with Memory and Several Outputs | online |
2003 | eprint | Certificateless Public Key Cryptography | online |
2003 | eprint | Using Information Theory Approach to Randomness Testing | online |
2003 | eprint | Weak Fields for ECC | online |
2003 | eprint | Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03 | online |
2003 | eprint | On the Pseudorandomness of KASUMI Type Permutations | online |
2003 | eprint | Homomorphic public-key systems based on subgroup membership problems | online |
2003 | eprint | Guaranteeing the diversity of number generators | online |
2003 | eprint | Minimum Distance between Bent and 1-resilient Boolean Functions | online |
2003 | eprint | Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions | online |
2003 | eprint | Collision Attack on Reduced-Round Camellia | online |
2003 | eprint | Efficient linear feedback shift registers with maximal period | online |
2003 | eprint | Bernoulli numbers and the probability of a birthday surprise | online |
2003 | eprint | Permutation graphs, fast forward permutations, and | online |
2003 | eprint | On the Randomness of the Editing Generator | online |
2003 | eprint | Trading-Off Type-Inference Memory Complexity Against Communication | online |
2003 | eprint | General Composition and Universal Composability in Secure Multiparty Computation | online |
2003 | eprint | A New Tree based Domain Extension of UOWHF | online |
2003 | eprint | Elliptic curves suitable for pairing based cryptography | online |
2003 | eprint | ID-based tripartite key agreement with signatures | online |
2003 | eprint | Symmetric Authentication Within a Simulatable Cryptographic Library | online |
2003 | eprint | Breaking and Repairing Optimistic Fair Exchange from PODC 2003 | online |
2003 | eprint | A Parallelizable Enciphering Mode | online |
2003 | eprint | A Tweakable Enciphering Mode | online |
2003 | eprint | Forward-Secure Hierarchical ID-Based Cryptography | online |
2003 | eprint | On the random-oracle methodology as applied to length-restricted signature schemes | online |
2003 | eprint | Optimal Statistical Power Analysis | online |
2003 | eprint | Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem | online |
2003 | eprint | ManTiCore: Encryption with Joint Cipher-State Authentication | online |
2003 | eprint | A Formal Proof of Zhu's Signature Scheme | online |
2003 | eprint | Efficient Provably Secure Public Key Steganography | online |
2003 | eprint | Some RSA-based Encryption Schemes with Tight Security Reduction | online |
2003 | eprint | A Sufficient Condition and Optimal Domain Extension of UOWHF | online |
2003 | eprint | An efficient variant of the RSA cryptosystem | online |
2003 | eprint | A More Secure and Efficacious TTS Signature Scheme | online |
2003 | eprint | Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology | online |
2003 | eprint | Cryptanalysis of the Alleged SecurID Hash Function | online |
2003 | eprint | Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography | online |
2003 | eprint | Identity-Based Threshold Decryption | online |
2003 | eprint | Commitment Capacity of Discrete Memoryless Channels | online |
2003 | eprint | A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves | online |
2003 | eprint | Identity-based Chameleon Hash and Applications | online |
2003 | eprint | Robust discretization, with an application to graphical passwords | online |
2003 | eprint | Properties of the Transformation Semigroup of the Solitaire Stream Cipher | online |
2003 | eprint | HARPS: HAshed Random Preloaded Subset Key Distribution | online |
2003 | eprint | Scalable Protocols for Authenticated Group Key Exchange | online |
2003 | eprint | NAEP: Provable Security in the Presence of Decryption Failures | online |
2003 | eprint | Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration | online |
2003 | eprint | Relaxing Chosen-Ciphertext Security | online |
2003 | eprint | Double-Speed Safe Prime Generation | online |
2003 | eprint | Patterson-Wiedemann Construction Revisited | online |
2003 | eprint | Building Secure Cryptographic Transforms, or How to Encrypt and MAC | online |
2003 | eprint | Constructing Optimistic Fair Exchange Protocols from Committed Signatures | online |
2003 | eprint | VMPC One-Way Function | online |
2003 | eprint | Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves | online |
2003 | eprint | On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? | online |
2003 | eprint | Chosen-Ciphertext Security from Identity-Based Encryption | online |
2003 | eprint | Certificate-Based Encryption and the Certificate Revocation Problem | online |
2003 | eprint | What do DES S-boxes Say to Each Other ? | online |
2003 | eprint | VMPC Stream Cipher | online |
2003 | eprint | Safe Prime Generation with a Combined Sieve | online |
2003 | eprint | Resource Bounded Unprovability of Computational Lower Bounds | online |
2003 | eprint | A New Forward Secure Signature Scheme using Bilinear Maps | online |
2003 | eprint | Cryptanalysis of publicly verifiable authenticated encryption | online |
2003 | eprint | Projective Coordinates Leak | online |
2003 | eprint | Universal Designated-Verifier Signatures | online |
2003 | eprint | Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures | online |
2003 | eprint | Security Analysis of Several Group Signature Schemes | online |
2003 | eprint | Public Key Encryption with keyword Search | online |
2003 | eprint | Security Analysis of Some Proxy Signatures | online |
2003 | eprint | Revisiting fully distributed proxy signature schemes | online |
2003 | eprint | Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria | online |
2003 | eprint | Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan | online |
2003 | eprint | Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature | online |
2003 | eprint | an attack on a multisignature scheme | online |
2003 | eprint | Yet Another Sieving Device | online |
2003 | eprint | Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors | online |
2003 | eprint | A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials | online |
2003 | eprint | Improved Cryptanalysis of SecurID | online |
2003 | eprint | Identity Based Undeniable Signatures | online |
2003 | eprint | Security Flaws in Several Group Signatures Proposed by Popescu | online |
2003 | eprint | ID-Based Chameleon Hashes from Bilinear Pairings | online |
2003 | eprint | Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003 | online |
2003 | eprint | On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes | online |
2003 | eprint | SFLASHv3, a fast asymmetric signature scheme | online |
2003 | eprint | High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two | online |
2003 | eprint | Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$ | online |
2003 | eprint | Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols | online |
2003 | eprint | Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC | online |
2003 | eprint | Secure Indexes | online |
2003 | eprint | Chemical Combinatorial Attacks on Keyboards | online |
2003 | eprint | A Security Evaluation of Whitenoise | online |
2003 | eprint | Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem | online |
2003 | eprint | A short comment on the affine parts of SFLASH^{v3} | online |
2003 | eprint | A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism | online |
2003 | eprint | A Verifiable Secret Sharing Scheme with Statistical zero-knowledge | online |
2003 | eprint | Cryptanalysis of a Cryptosystem based on Drinfeld modules | online |
2003 | eprint | | online |
2003 | eprint | Masking Based Domain Extenders for UOWHFs: Bounds and Constructions | online |
2003 | eprint | On the Security of a Group Signature Scheme with Forward Security | online |
2003 | eprint | Attacks on a Secure Group Communication Scheme With Hierarchical Access Control | online |
2003 | eprint | Verifiably Committed Signatures Provably Secure in The Standard Complexity Model | online |
2003 | eprint | Algebraic Attacks on Summation Generators | online |
2003 | eprint | A Fast Provably Secure Cryptographic Hash Function | online |
2003 | eprint | Public-Key Steganography with Active Attacks | online |
2003 | eprint | The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm | online |
2003 | eprint | Public Key Steganography | online |
2003 | eprint | Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary | online |
2003 | eprint | Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data | online |
2003 | eprint | Combinational Logic Design for AES SubByte Transformation on Masked Data | online |
2003 | eprint | Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity | online |
2003 | eprint | Chameleon Signature from Bilinear Pairing | online |
2003 | eprint | Universally Composable Signatures, Certification and Authentication | online |
2003 | eprint | How to Break and Repair a Universally Composable Signature Functionality | online |
2003 | eprint | Hybrid Broadcast Encryption and Security Analysis | online |
2003 | eprint | Improved Weil and Tate pairings for elliptic and hyperelliptic curves | online |
2003 | eprint | An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures | online |
2003 | eprint | Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks | online |
2003 | eprint | A Key Substitution Attack on SFLASH^{v3} | online |
2003 | eprint | Quantum Digital Signature Based on Quantum One-way Functions | online |
2003 | eprint | ID-based Authenticated Two Round Multi-Party Key Agreement | online |
2003 | eprint | Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n) | online |
2003 | eprint | Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004) | online |
2003 | eprint | Breaking the Stream Cipher Whitenoise | online |
2003 | eprint | Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields | online |
2003 | eprint | On Simulation-Sound Trapdoor Commitments | online |
2003 | eprint | Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations | online |
2003 | eprint | Committing Encryption and Publicly-Verifiable SignCryption | online |
2003 | eprint | Improved Constructions for Universal Re-encryption | online |
2003 | eprint | On the Security of a Multi-Party Certified Email Protocol | online |
2003 | eprint | Trading Inversions for Multiplications in Elliptic Curve Cryptography | online |
2003 | eprint | Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices | online |
2003 | eprint | Attack on Two ID-based Authenticated Group Key Agreement Schemes | online |
2003 | eprint | An Improved ID-based Authenticated Group Key Agreement Scheme | online |
2003 | eprint | A provably secure ID-based ring signature scheme | online |
2003 | eprint | A Mode of Operation with Partial Encryption and Message Integrity | online |
2003 | eprint | Security Analysis of Lal and Awasthi's Proxy Signature Schemes | online |
2003 | eprint | Imperfect Decryption and an Attack on the NTRU Encryption Scheme | online |
2003 | eprint | Inversion of Several Field Elements: A New Parallel Algorithm | online |
2003 | eprint | Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case | online |
2003 | eprint | Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications | online |
2003 | eprint | ID-based tripartite Authenticated Key Agreement Protocols from pairings | online |
2003 | eprint | Distributing the Encryption and Decryption of a Block Cipher | online |
2003 | eprint | Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case | online |
2003 | eprint | A Price Negotiable Transaction System | online |
2003 | eprint | DFA on AES | online |
2003 | eprint | Domain Extenders for UOWHF: A Finite Binary Tree Algorithm | online |
2003 | eprint | Differential Fault Analysis on A.E.S | online |
2003 | eprint | Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme | online |
2003 | eprint | The number of initial states of the RC4 cipher with the same cycle structure | online |
2003 | eprint | Security Constraints on the Oswald-Aigner Exponentiation Algorithm | online |
2003 | eprint | Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation | online |
2003 | eprint | A Universally Composable Cryptographic Library | online |
2003 | eprint | A Threshold GQ Signature Scheme | online |
2003 | eprint | Perfect Hash Families with Few Functions | online |
2003 | eprint | An Authenticated Group Key Agreement Protocol on Braid groups | online |
2003 | eprint | A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem | online |
2003 | eprint | Attacks based on Conditional Correlations against the Nonlinear Filter Generator | online |
2003 | eprint | Interleaving Cryptography and Mechanism Design: The Case of Online Auctions | online |
2003 | eprint | Did Filiol Break AES ? | online |
2003 | eprint | New identity based signcryption schemes from pairings | online |
2003 | eprint | On Modeling IND-CCA Security in Cryptographic Protocols | online |
2003 | eprint | Homomorphic public-key cryptosystems and encrypting boolean circuits | online |
2003 | eprint | Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update) | online |
2003 | eprint | Cryptographic Randomized Response Techniques | online |
2003 | eprint | Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults | online |
2003 | eprint | Universal Padding Schemes for RSA with Optimal Bandwidth of Message Recovery | online |
2003 | eprint | Efficient Multi-Party Computation over Rings | online |
2003 | eprint | Cryptographic Tamper Evidence | online |
2003 | eprint | A Framework for Password-Based Authenticated Key Exchange | online |
2003 | eprint | Integral Cryptanalysis on reduced-round Safer++ | online |
2003 | eprint | On the (In)security of the Fiat-Shamir Paradigm | online |
2003 | eprint | On alternative approach for verifiable secret sharing | online |
2003 | eprint | Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem | online |
2003 | eprint | Strengthening Zero-Knowledge Protocols using Signatures | online |
2003 | eprint | Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions | online |
2003 | eprint | Torus-based cryptography | online |
2003 | eprint | A new statistical distinguisher for the shrinking generator | online |
2003 | eprint | Timed Fair Exchange of Standard Signatures | online |
2003 | eprint | Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings | online |
2003 | eprint | Signcryption scheme for Identity-based Cryptosystems | online |
2003 | eprint | An algorithm to obtain an RSA modulus with a large private key | online |
2003 | eprint | Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers | online |
2003 | eprint | A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme | online |
2003 | eprint | Compounding Secret Sharing Schemes | online |
2003 | eprint | Hidden Number Problem in Small Subgroups | online |
2003 | eprint | Concealment and its Applications to Authenticated Encryption | online |
2003 | eprint | How to Predict the Output of a Hardware Random Number Generator | online |
2003 | eprint | Attacking RSA-based Sessions in SSL/TLS | online |
2003 | eprint | Tate-pairing implementations for tripartite key agreement | online |
2003 | eprint | ID based Cryptosystems with Pairing on Elliptic Curve | online |
2003 | eprint | A New Approach to Prevent Blackmailing in E-Cash | online |
2003 | eprint | Computing of Trust in Distributed Networks | online |
2003 | eprint | Secure Multiplication of Shared Secrets in the Exponent | online |
2003 | eprint | An Elliptic Curve Trapdoor System | online |
2003 | eurocrypt | Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic Time | online |
2003 | eurocrypt | A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms | online |
2003 | eurocrypt | A Framework for Password-Based Authenticated Key Exchange | online |
2003 | eurocrypt | A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions | online |
2003 | eurocrypt | Why Provable Security Matters? | online |
2003 | eurocrypt | Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures | online |
2003 | eurocrypt | Certificate-Based Encryption and the Certificate Revocation Problem | online |
2003 | eurocrypt | A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications | online |
2003 | eurocrypt | Predicting the Shrinking Generator with Fixed Connections | online |
2003 | eurocrypt | Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions | online |
2003 | eurocrypt | A Signature Scheme as Secure as the Diffie-Hellman Problem | online |
2003 | eurocrypt | Two-Threshold Broadcast and Detectable Multi-party Computation | online |
2003 | eurocrypt | On the Security of RDSA | online |
2003 | eurocrypt | The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations | online |
2003 | eurocrypt | Resettable Zero-Knowledge in the Weak Public-Key Model | online |
2003 | eurocrypt | Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms | online |
2003 | eurocrypt | Simulatable Commitments and Efficient Concurrent Zero-Knowledge | online |
2003 | eurocrypt | Cryptanalysis of the EMD Mode of Operation | online |
2003 | eurocrypt | Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition | online |
2003 | eurocrypt | On the Optimality of Linear, Differential, and Sequential Distinguishers | online |
2003 | eurocrypt | Algebraic Attacks on Stream Ciphers with Linear Feedback | online |
2003 | eurocrypt | Nearly One-Sided Tests and the Goldreich-Levin Predicate | online |
2003 | eurocrypt | Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings | online |
2003 | eurocrypt | Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications | online |
2003 | eurocrypt | Round Efficiency of Multi-party Computation with a Dishonest Majority | online |
2003 | eurocrypt | A Forward-Secure Public-Key Encryption Scheme | online |
2003 | eurocrypt | Efficient Multi-party Computation over Rings | online |
2003 | eurocrypt | Fair Secure Two-Party Computation | online |
2003 | eurocrypt | On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions | online |
2003 | eurocrypt | The GHS Attack Revisited | online |
2003 | eurocrypt | Aggregate and Verifiably Encrypted Signatures from Bilinear Maps | online |
2003 | eurocrypt | Extracting Group Signatures from Traitor Tracing Schemes | online |
2003 | eurocrypt | Provably Secure Threshold Password-Authenticated Key Exchange | online |
2003 | eurocrypt | New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction | online |
2003 | eurocrypt | CAPTCHA: Using Hard AI Problems for Security | online |
2003 | eurocrypt | A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem | online |
2003 | eurocrypt | Facts and Myths of Enigma: Breaking Stereotypes | online |
2003 | eurocrypt | Concealment and Its Applications to Authenticated Encryption | online |
2003 | eurocrypt | Cryptanalysis of the Public-Key Encryption Based on Braid Groups | online |
2003 | eurocrypt | Strengthening Zero-Knowledge Protocols Using Signatures | online |
2003 | fse | Loosening the KNOT | online |
2003 | fse | New Attacks against Standardized MACs | online |
2003 | fse | Optimal Key Ranking Procedures in a Statistical Cryptanalysis | online |
2003 | fse | Analysis of RMAC | online |
2003 | fse | Interplay between Coding and Cryptography | |
2003 | fse | PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation | online |
2003 | fse | Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES | online |
2003 | fse | Cryptanalysis of IDEA-X/2 | online |
2003 | fse | A Concrete Security Analysis for 3GPP-MAC | online |
2003 | fse | Linear Approximations of Addition Modulo 2n | online |
2003 | fse | Turing: A Fast Stream Cipher | online |
2003 | fse | Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers | online |
2003 | fse | OMAC: One-Key CBC MAC | online |
2003 | fse | Cryptanalysis of Block Ciphers Based on SHA-1 and MD5 | online |
2003 | fse | A New Class of Collision Attacks and Its Application to DES | online |
2003 | fse | A Generic Protection against High-Order Differential Power Analysis | online |
2003 | fse | Further Observations on the Structure of the AES Algorithm | online |
2003 | fse | Cryptanalysis of SOBER-t32 | online |
2003 | fse | Differential-Linear Cryptanalysis of Serpent | online |
2003 | fse | Rectangle Attacks on 49-Round SHACAL-1 | online |
2003 | fse | Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive | online |
2003 | fse | Analysis of Involutional Ciphers: Khazad and Anubis | online |
2003 | fse | Block Ciphers and Systems of Quadratic Equations | online |
2003 | fse | Practical Symmetric On-Line Encryption | online |
2003 | fse | Linear Redundancy in S-Boxes | online |
2003 | fse | The Security of "One-Block-to-Many" Modes of Operation | online |
2003 | fse | Rabbit: A New High-Performance Stream Cipher | online |
2003 | fse | On the Resynchronization Attack | online |
2003 | fse | On Plateaued Functions and Their Constructions | online |
2003 | jofc | Buses for Anonymous Message Delivery | 25-39 |
2003 | jofc | The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme | 185-215 |
2003 | jofc | Decorrelation: A Theory for Block Cipher Security | 249-286 |
2003 | jofc | Trading Help for Interaction in Statistical Zero-Knowledge Proofs | 95-116 |
2003 | jofc | On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators | 71-93 |
2003 | jofc | Oblivious Transfers and Privacy Amplification | 219-237 |
2003 | jofc | Edit Probability Correlation Attacks on Stop/ Go Clocked Keystream Generators | 41-68 |
2003 | jofc | Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups | 239-247 |
2003 | jofc | Generating Random Factored Numbers, Easily | 287-289 |
2003 | jofc | Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation | 143-184 |
2003 | jofc | A Probable Prime Test with Very High Confidence for n L 3 mod 4 | 117-139 |
2003 | jofc | Efficient Amplification of the Security of Weak Pseudo-Random Function Generators | 1-24 |
2003 | pkc | A Practical Public Key Cryptosystem from Paillier and Rabin Schemes | online |
2003 | pkc | Randomness Re-use in Multi-recipient Encryption Schemeas | online |
2003 | pkc | A Dedicated Sieving Hardware | online |
2003 | pkc | A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems | online |
2003 | pkc | Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme | online |
2003 | pkc | A Verifiable Secret Shuffle of Homomorphic Encryptions | online |
2003 | pkc | Round-Optimal Contributory Conference Key Agreement | online |
2003 | pkc | A Practical Attack on Some Braid Group Based Cryptographic Primitives | online |
2003 | pkc | An Identity-Based Signature from Gap Diffie-Hellman Groups | online |
2003 | pkc | Exceptional Procedure Attack on Elliptic Curve Cryptosystems | online |
2003 | pkc | Generic Attacks and the Security of Quartz | online |
2003 | pkc | On the Security of HFE, HFEv- and Quartz | online |
2003 | pkc | Side-Channel Attacks on Textbook RSA and ElGamal Encryption | online |
2003 | pkc | An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack | online |
2003 | pkc | On the Bit Security of NTRUEncrypt | online |
2003 | pkc | A Lattice Based Public Key Cryptosystem Using Polynomial Representations | online |
2003 | pkc | On Montgomery-Like Representationsfor Elliptic Curves over GF(2k) | online |
2003 | pkc | Security Analysis of the MOR Cryptosystem | online |
2003 | pkc | The Security of DSA and ECDSA | online |
2003 | pkc | Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks | online |
2003 | pkc | Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings | online |
2003 | pkc | Efficient Construction of (Distributed) Verifiable Random Functions | online |
2003 | pkc | A Fast and Secure Implementation of Sflash | online |
2003 | pkc | Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack | online |
2003 | pkc | Strong Key-Insulated Signature Schemes | online |
2003 | pkc | Validation of Elliptic Curve Public Keys | online |
2003 | pkc | The Cramer-Shoup Strong-RSASignature Scheme Revisited | online |