default search action
ASIACRYPT 2003: Taipei, Taiwan
- Chi-Sung Laih:
Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings. Lecture Notes in Computer Science 2894, Springer 2003, ISBN 3-540-20592-6
Public Key Cryptography I
- Duong Hieu Phan, David Pointcheval:
Chosen-Ciphertext Security without Redundancy. 1-18 - Kaoru Kurosawa, Tsuyoshi Takagi:
Some RSA-Based Encryption Schemes with Tight Security Reduction. 19-36 - Emmanuel Bresson, Dario Catalano, David Pointcheval:
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. 37-54
Number Theory I
- Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James P. Hughes, Paul C. Leyland:
Factoring Estimates for a 1024-Bit RSA Modulus. 55-74 - Nicolas Thériault:
Index Calculus Attack for Hyperelliptic Curves of Small Genus. 75-92
Efficient Implementations
- Pradeep Kumar Mishra, Palash Sarkar:
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves. 93-110 - Iwan M. Duursma, Hyang-Sook Lee:
Tate Pairing Implementation for Hyperelliptic Curves y2 = xp-x + d. 111-123 - David R. Kohel:
The AGM-X0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting. 124-136
Key Management and Protocols
- Miodrag J. Mihaljevic:
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. 137-154 - SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Leakage-Resilient Authenticated Key Establishment Protocols. 155-172 - Chih-Hung Wang:
Untraceable Fair Network Payment Protocols with Off-Line TTP. 173-187
Hash Functions
- Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh:
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. 188-207 - Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi:
New Parallel Domain Extenders for UOWHF. 208-227 - Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle:
Cryptanalysis of 3-Pass HAVAL. 228-245
Group Signatures
- Giuseppe Ateniese, Breno de Medeiros:
Efficient Group Signatures without Trapdoors. 246-268 - Gene Tsudik, Shouhuai Xu:
Accumulating Composites and Improved Group Signing. 269-286 - Tatsuaki Okamoto, Jacques Stern:
Almost Uniform Density of Power Residues and the Provable Security of ESIGN. 287-301
Number Theory II
- Jason E. Gower:
Rotations and Translations of Number Field Sieve Polynomials. 302-310 - Mark L. Bauer, Safuat Hamdy:
On Class Group Computations Using the Number Field Sieve. 311-325
Invited Talk
- Hong-Sen Yan, Hsing-Hui Huang:
The Secret and Beauty of Ancient Chinese Padlocks. 326-330
Block Cipher
- Olivier Billet, Henri Gilbert:
A Traceable Block Cipher. 331-346 - Frédéric Muller:
A New Attack against Khazad. 347-358
Broadcast and Multicast
- Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee:
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. 359-373 - Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai:
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. 374-391
Foundations and Complexity Theory
- Jean-Sébastien Coron, David Naccache:
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. 392-397 - Helger Lipmaa:
On Diophantine Complexity and Statistical Zero-Knowledge Arguments. 398-415 - Helger Lipmaa:
Verifiable Homomorphic Oblivious Transfer and Private Equality Test. 416-433
Public Key Cryptography II
- Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi:
Generalized Powering Functions and Their Application to Digital Signatures. 434-451 - Sattam S. Al-Riyami, Kenneth G. Paterson:
Certificateless Public Key Cryptography. 452-473 - Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi:
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. 474-491 - Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard:
The Insecurity of Esign in Practical Implementations. 492-506
Digital Signature
- Huaxiong Wang, Josef Pieprzyk:
Efficient One-Time Proxy Signatures. 507-522 - Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk:
Universal Designated-Verifier Signatures. 523-542
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.