default search action
6. PKC 2003: Miami, Florida, USA
- Yvo Desmedt:
Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings. Lecture Notes in Computer Science 2567, Springer 2002, ISBN 3-540-00324-X
Diffie-Hellman Based Schemes
- Yevgeniy Dodis:
Efficient Construction of (Distributed) Verifiable Random Functions. 1-17 - Jae Choon Cha, Jung Hee Cheon:
An Identity-Based Signature from Gap Diffie-Hellman Groups. 18-30
Threshold Cryptography
- Alexandra Boldyreva:
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. 31-46 - Philip D. MacKenzie:
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. 47-61
Reduction Proofs
- Mats Näslund, Igor E. Shparlinski, William Whyte:
On the Bit Security of NTRUEncrypt. 62-70 - Yodai Watanabe, Junji Shikata, Hideki Imai:
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks. 71-84
Broadcast and Tracing
- Mihir Bellare, Alexandra Boldyreva, Jessica Staddon:
Randomness Re-use in Multi-recipient Encryption Schemeas. 85-99 - Yevgeniy Dodis, Nelly Fazio:
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. 100-115
Digital Signatures
- Marc Fischlin:
The Cramer-Shoup Strong-RSASignature Scheme Revisited. 116-129 - Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung:
Strong Key-Insulated Signature Schemes. 130-144
Specialized Multiparty Cryptography
- Jens Groth:
A Verifiable Secret Shuffle of Homomorphic Encryptions. 145-160 - Colin Boyd, Juan Manuel González Nieto:
Round-Optimal Contributory Conference Key Agreement. 161-174
Cryptanalysis I
- Christian Tobias:
Security Analysis of the MOR Cryptosystem. 175-186 - Dennis Hofheinz, Rainer Steinwandt:
A Practical Attack on Some Braid Group Based Cryptographic Primitives. 187-198
Elliptic Curves: Implementation Attacks
- Louis Goubin:
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. 199-210 - Adrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone:
Validation of Elliptic Curve Public Keys. 211-223 - Tetsuya Izu, Tsuyoshi Takagi:
Exceptional Procedure Attack on Elliptic Curve Cryptosystems. 224-239
Implementation and Hardware Issues
- Martijn Stam:
On Montgomery-Like Representationsfor Elliptic Curves over GF(2k). 240-253 - Willi Geiselmann, Rainer Steinwandt:
A Dedicated Sieving Hardware. 254-266 - Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin:
A Fast and Secure Implementation of Sflash. 267-278
New Public Key Schemes
- David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar:
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. 279-291 - Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha:
A Lattice Based Public Key Cryptosystem Using Polynomial Representations. 292-308
Elliptic Curves: General Issues
- Serge Vaudenay:
The Security of DSA and ECDSA. 309-323 - Ulrich Kühn:
Side-Channel Attacks on Textbook RSA and ElGamal Encryption. 324-336 - Nicolas T. Courtois, Magnus Daum, Patrick Felke:
On the Security of HFE, HFEv- and Quartz. 337-350 - Nicolas T. Courtois:
Generic Attacks and the Security of Quartz. 351-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.