Title Authors Affiliations Country
Factoring estimates for a 1024-bit RSA modulus Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James Hughes, Paul Leyland Citibank, Technische Universiteit Eindhoven and Lehigh University and Storage Technology Corporation and Microsoft Research USA
Rotations and Translations of Number Field Sieve Polynomials Jason E. Gower Purdue University USA
Chosen-Ciphertext Security without Redundancy Duong Hieu Phan and David Pointcheval ENS, France and ENS, France Fracnce
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves Pradeep Kumar Mishra and Palash Sarkar Indian Statistical Institute and Indian Statistical Insititute India
Almost uniform density of power residues and the provable security of ESIGN Tatsuaki Okamoto and Jacques Stern NTT Labs and ENS France
Index Calculus Attack for Hyperelliptic Curves of Small Genus Nicolas Thériault University of Toronto Canada
Some RSA-based Encryption Schemes with Tight Security Reduction Kaoru Kurosawa and Tsuyoshi Takagi Ibaraki University and TU Darmstadt Japan
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption Jean-Sebastien Coron and David Naccache Gemplus Card International, 34 rue Guynemer, 92447 Issy-les-Moulineaux, France France
Efficient Group Signatures without Trapdoors Giuseppe Ateniese and Breno de Medeiros Johns Hopkins University and Johns Hopkins University USA
Efficient One-time Proxy Signatures Huaxiong Wang and Josef Pieprzyk Macquarie University, Australia and Macquarie University, Australia Australia
Universal Designated-Verifier Signatures Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef Pieprzyk Macquarie University and Monash University and Macquarie University and Macquarie University Australia
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack Chong Hee Kim and Yong Ho Hwang and Pil Joong Lee Pohang University of Science and Technology Korea
A New Attack Against Khazad Frédéric Muller DCSSI Crypto Lab France
On Diophantine Complexity and Statistical Zero-Knowledge Arguments Helger Lipmaa Helsinki University of Technology Finland
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications Emmanuel Bresson and Dario Catalano and David Pointcheval CELAR and ENS and ENS France
Generalized Powering Functions and their Application to Digital Signatures Hisayoshi Sato and Tsuyoshi Takagi and Satoru Tezuka and Kazuo Takaragi Hitachi and TU Darmstadt and Hitachi and Hitachi Germany
Certificateless Public Key Cryptography S.S. Al-Riyami and K.G. Paterson Information Security Group, Royal Holloway University of London United Kingdom
A Traceable Block Cipher Olivier Billet and Henri Gilbert France Telecom R&D France
A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems Tsuyoshi Takagi and Katja Schmidt-Samoa and Kaoru Kurosawa Technische Universitat Darmstadt, Fachbereich Informatik, Alexanderstrasse 10, D-64283 Darmstadt, Germany; Ibaraki University, 4-12-1 Nakanarusawa, Hitachi, Ibaraki, 316-8511, Japan Germany
Cryptanalysis of 3-pass HAVAL Bart Van Rompay and Bart Preneel and Joos Vandewalle and Alex Biryukov Katholieke Universiteit Leuven ESAT/SCD-COSIC Beligium
Verifiable Homomorphic Oblivious Transfer and Private Equality Test Helger Lipmaa Helsinki University of Technology Finland
Tate-pairing implementation for the hyperelliptic curves y2 = xp - x + d Iwan Duursma and Hyang-Sook Lee Department of Mathematics, University of Illinois at Urbana-Champaign and Department of Mathematics, Ewha Womans University Korea
On Class Group Computations Using the Number Field Sieve Mark L. Bauer and Safuat Hamdy University of Waterloo and University of Calgary Canada
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking Dwaine Clarke and Srinivas Devadas and Marten van Dijk and Blaise Gassend and G. Edward Suh MIT Laboratory for Computer Science USA
Accumulating Composites and Improved Group Signing Gene Tsudik and Shouhuai Xu Department of Information and Computer Science, UC Irvine USA
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy Miodrag J. Mihaljević Mathematical Institute, Serbian Academy of Sciences and Arts, Belgrade Yugoslavia
The AGM-X0(N) Heegner point lifting algorithm and elliptic curve point counting David R. Kohel University of Sydney Australia
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes Nuttapong Attrapadung and Kazukuni Kobara and Hideki Imai Imai Laboratory, Institute of Industrial Science, University of Tokyo Japan
Leakage-Resilient Authenticated Key Establishment Protocols SeongHan Shin and Kazukuni Kobara and Hideki Imai Institute of Industrial Science, The University of Tokyo, Japan Japan
The Insecurity of Esign in Practical Implementations Pierre-Alain Fouque and Gwenaëlle Martinet and Guillaume Poupard and Nick Howgrave-Graham DCSSI Crypto Lab France
Untraceable Fair Network Payment Protocols with Off-line TTP Chih-Hung Wang Department of Computer Science and Information Engineering Taiwan
New Parallel Domain Extenders for UOWHF Wonil Lee and Donghoon Chang and Sangjin Lee and Soohak Sung and Mridul Nandi Korea University and Paichai University and Applied Statistical Unit in Indian Statistical Institute Korea, India