IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of ASIACRYPT 2003

Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings , Springer
Chosen-Ciphertext Security without Redundancy., Duong Hieu Phan, David Pointcheval, pp. 1-18
 PDF  postscript BibTeX
Some RSA-Based Encryption Schemes with Tight Security Reduction., Kaoru Kurosawa, Tsuyoshi Takagi, pp. 19-36
 PDF  postscript BibTeX
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications., Emmanuel Bresson, Dario Catalano, David Pointcheval, pp. 37-54
 PDF  postscript BibTeX
Factoring Estimates for a 1024-Bit RSA Modulus., Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James Hughes, Paul C. Leyland, pp. 55-74
 PDF  postscript BibTeX
Index Calculus Attack for Hyperelliptic Curves of Small Genus., Nicolas Thériault, pp. 75-92
 PDF  postscript BibTeX
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves., Pradeep Kumar Mishra, Palash Sarkar, pp. 93-110
 PDF  postscript BibTeX
Tate Pairing Implementation for Hyperelliptic Curves y2 = xp-x + d., Iwan M. Duursma, Hyang-Sook Lee, pp. 111-123
 BibTeX
The AGM-X0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting., David R. Kohel, pp. 124-136
 BibTeX
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy., Miodrag J. Mihaljevic, pp. 137-154
 PDF  postscript BibTeX
Leakage-Resilient Authenticated Key Establishment Protocols., SeongHan Shin, Kazukuni Kobara, Hideki Imai, pp. 155-172
 PDF  postscript BibTeX
Untraceable Fair Network Payment Protocols with Off-Line TTP., Chih-Hung Wang, pp. 173-187
 BibTeX
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking., Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh, pp. 188-207
 PDF  postscript BibTeX
New Parallel Domain Extenders for UOWHF., Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi, pp. 208-227
 PDF  postscript BibTeX
Cryptanalysis of 3-Pass HAVAL., Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle, pp. 228-245
 PDF  postscript BibTeX
Efficient Group Signatures without Trapdoors., Giuseppe Ateniese, Breno de Medeiros, pp. 246-268
 PDF  postscript BibTeX
Accumulating Composites and Improved Group Signing., Gene Tsudik, Shouhuai Xu, pp. 269-286
 PDF  postscript BibTeX
Almost Uniform Density of Power Residues and the Provable Security of ESIGN., Tatsuaki Okamoto, Jacques Stern, pp. 287-301
 PDF  postscript BibTeX
Rotations and Translations of Number Field Sieve Polynomials., Jason E. Gower, pp. 302-310
 PDF  postscript BibTeX
On Class Group Computations Using the Number Field Sieve., Mark L. Bauer, Safuat Hamdy, pp. 311-325
 PDF  postscript BibTeX
The Secret and Beauty of Ancient Chinese Padlocks., Hong-Sen Yan, Hsing-Hui Huang, pp. 326-330
 BibTeX
A Traceable Block Cipher., Olivier Billet, Henri Gilbert, pp. 331-346
 PDF  postscript BibTeX
A New Attack against Khazad., Frédéric Muller, pp. 347-358
 PDF  postscript BibTeX
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack., Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee, pp. 359-373
 PDF  postscript BibTeX
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes., Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai, pp. 374-391
 PDF  postscript BibTeX
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption., Jean-Sébastien Coron, David Naccache, pp. 392-397
 PDF  postscript BibTeX
On Diophantine Complexity and Statistical Zero-Knowledge Arguments., Helger Lipmaa, pp. 398-415
 PDF  postscript BibTeX
Verifiable Homomorphic Oblivious Transfer and Private Equality Test., Helger Lipmaa, pp. 416-433
 PDF  postscript BibTeX
Generalized Powering Functions and Their Application to Digital Signatures., Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi, pp. 434-451
 PDF  postscript BibTeX
Certificateless Public Key Cryptography., Sattam S. Al-Riyami, Kenneth G. Paterson, pp. 452-473
 PDF  postscript BibTeX
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems., Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi, pp. 474-491
 PDF  postscript BibTeX
The Insecurity of Esign in Practical Implementations., Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard, pp. 492-506
 PDF  postscript BibTeX
Efficient One-Time Proxy Signatures., Huaxiong Wang, Josef Pieprzyk, pp. 507-522
 BibTeX
Universal Designated-Verifier Signatures., Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk, pp. 523-542
 PDF  postscript BibTeX

[ IACR home page ] © IACR