Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project

EUROCRYPT 2003: Warsaw, Poland

Eli Biham (Ed.): Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings. Lecture Notes in Computer Science 2656 Springer 2003, ISBN 3-540-14039-5 BibTeX

Sponsored by the
International Association of Cryptologic Research (IACR)
in cooperation with the Institute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, Warsaw

General Chair
Jerzy Gawinecki,
Institute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, Kaliskiego Str. 2, 00-908 Warsaw, Poland

Program Chair
Eli Biham,
Computer Science Department, Technion -- Israel Institute of Technology, Technion City, Haifa 32000, Israel

PREFACE by Eli Biham

Program Committee

Johannes Buchmann ....... TU Darmstadt, Germany
Christian Cachin ....... IBM Research, Switzerland
Don Coppersmith ....... IBM Research, USA
Ronald Cramer ....... Aarhus, Denmark
Joan Daemen ....... Protonworld, Belgium
Yevgeniy Dodis ....... New York University, USA
Cynthia Dwork ....... Microsoft, USA
Juan Garay ....... Bell Labs, USA
Helena Handschuh ....... Gemplus, France
Stanisław Jarecki ....... Stanford, USA
Kwangjo Kim ....... ICU, Korea
Lars R. Knudsen ....... Technical University of Denmark
Shiho Moriai ....... NTT, Japan
Moni Naor ....... Weizmann Institute of Science, Israel
Paul Van Oorschot ....... Carleton University, Canada
Josef Pieprzyk ....... Macquarie University, Australia
David Pointcheval ....... CNRS--ENS, France
Matt Robshaw ....... Royal Holloway, UK
Berry Schoenmakers ....... TU Eindhoven, The Netherlands
Nigel Smart ....... University of Bristol, UK
Douglas R. Stinson ....... Waterloo, Canada
Serge Vaudenay ....... EPFL, Switzerland

Other Contributors


Table of Contents

Cryptanalysis I

Secure Multi-party Computation I

Invited Talk I

Zero-Knowledge Protocols

Foundations and Complexity Theoretic Security

Public Key Encryption

New Primitives

Cryptanalysis II

Elliptic Curves Cryptography

Digital Signatures

Invited Talk II

Cryptanalysis III

Key Exchange

Information Theoretic Cryptography

Secure Multi-party Computation II

Group Signatures


AUTHOR INDEX