CRYPTO 2003: Santa Barbara, California, USA
Dan Boneh (Ed.): Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings. Lecture Notes in Computer Science 2729 Springer 2003, ISBN 3-540-40674-3 BibTeX
International Association for Cryptologic Research (IACR)
in cooperation with
IEEE Computer Society Technical Committee on Security and Privacy,
Computer Science Department, University of California, Santa Barbara
General Chair
Greg Rose, Qualcomm Australia
Program Chair
Dan Boneh,
Stanford University, USA
Program Committee
Mihir Bellare | ..... | U.C. San Diego, USA |
Jan Camenisch | ..... | IBM Research, Zurich |
Don Coppersmith | ..... | IBM Research, Watson, USA |
Jean-Sebastien Coron | ..... | Gemplus Card International, France |
Ronald Cramer | ..... | BRICS, Denmark |
Antoine Joux | ..... | DCSSI Crypto Lab, France |
Charanjit Jutla | ..... | IBM Research, Watson, USA |
Jonathan Katz | ..... | University of Maryland, USA |
Eyal Kushilevitz | ..... | Technion, Israel |
Anna Lysyanskaya | ..... | Brown University, USA |
Phil MacKenzie | ..... | Bell Labs, USA |
Mitsuru Matsui | ..... | Mitsubishi Electric, Japan |
Tatsuaki Okamoto | ..... | NTT, Japan |
Rafail Ostrovsky | ..... | Telcordia Technologies, USA |
Benny Pinkas | ..... | HP Labs, USA |
Bart Preneel | ..... | Katholieke Universiteit Leuven, Belgium |
Tal Rabin | ..... | IBM Research, Watson, USA |
Kazue Sako | ..... | NEC, Japan |
Victor Shoup | ..... | NYU, USA |
Jessica Staddon | ..... | PARC, USA |
Ramarathnam Venkatesan | ..... | Microsoft Research, USA |
Michael Wiener | ..... | Canada |
Moti Yung (Crypto 2002 Program Chair), Columbia University, USA
Matthew Franklin (Crypto 2004 Program Chair), U.C. Davis, USA
External Reviewers
TABLE OF CONTENTS
Public Key Cryptanalysis I
-
Adi Shamir
,
Eran Tromer
:
Factoring Large Number with the TWIRL Device. (.ps) 1-26
BibTeX -
Johannes Blömer
,
Alexander May
:
New Partial Key Exposure Attacks on RSA. (.ps) 27-43
BibTeX -
Jean-Charles Faugére
,
Antoine Joux
:
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. (.ps) 44-60
BibTeX
Alternate Adversary Models
-
Salil P. Vadhan
:
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model. (.ps) 61-77
BibTeX -
Renato Renner
,
Stefan Wolf
:
Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret. (.ps) 78-95
BibTeX
Invited Talk I
Protocols
-
Jonathan Katz
,
Moti Yung
:
Scalable Protocols for Authenticated Group Key Exchange. (.ps) 110-125
BibTeX -
Jan Camenisch
,
Victor Shoup
:
Practical Verifiable Encryption and Decryption of Discrete Logarithms. (.ps) 126-144
BibTeX -
Yuval Ishai
,
Joe Kilian
,
Kobbi Nissim
,
Erez Petrank
:
Extending Oblivious Transfers Efficiently. (.ps) 145-161
BibTeX
Symmetric Key Cryptanalysis I
-
Frederik Armknecht
,
Matthias Krause
:
Algebraic Attacks on Combiners with Memory. (.ps) 162-175
BibTeX -
Nicolas Courtois
:
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. (.ps) 176-194
BibTeX -
Alex Biryukov
,
Christophe De Canniére
,
Gustaf Dellkrantz
:
Cryptanalysis of SAFER++. (.ps) 195-211
BibTeX
Public Key Cryptanalysis II
-
Jung Hee Cheon
,
Byungheup Jun
:
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. (.ps) 212-225
BibTeX -
Nick Howgrave-Graham
,
Phong Q. Nguyen
,
David Pointcheval
,
John Proos
,
Joseph H. Silverman
,
Ari Singer
,
William Whyte
:
The Impact of Decryption Failures on the Security of NTRU Encryption. (.ps) 226-246
BibTeX
Universal Composability
-
Ivan Damgård
,
Jesper Buus Nielsen
:
Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. (.ps) 247-264
BibTeX -
Ran Canetti
,
Tal Rabin
:
Universal Composition with Joint State. (.ps) 265-281
BibTeX
Zero-Knowledge
-
Daniele Micciancio
,
Salil P. Vadhan
:
Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More. (.ps) 282-298
BibTeX -
Boaz Barak
,
Shien Jin Ong
,
Salil P. Vadhan
:
Derandomization in Cryptography. (.ps) 299-315
BibTeX -
Rafael Pass
:
On Deniability in the Common Reference String and Random Oracle Model. (.ps) 316-337
BibTeX
Algebraic Geometry
-
Qi Cheng
:
Primality Proving via One Round in ECPP and One Iteration in AKS. (.ps) 338-348
BibTeX -
Karl Rubin
,
Alice Silverberg
:
Torus-Based Cryptography. (.ps) 349-365
BibTeX
Public Key Constructions
-
Yuichi Komano
,
Kazuo Ohta
:
Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. (.ps) 366-382
BibTeX -
Xavier Boyen
:
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). (.ps) 383-399
BibTeX
Invited Talk II
-
Hugo Krawczyk
:
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. (.ps) 400-425
BibTeX
New Problems
-
Cynthia Dwork
,
Andrew Goldberg
,
Moni Naor
:
On Memory-Bound Functions for Fighting Spam. (.ps) 426-444
BibTeX -
Niv Buchbinder
,
Erez Petrank
:
Lower and Upper Bounds on Obtaining History Independence. (.ps) 445-462
BibTeX -
Yuval Ishai
,
Amit Sahai
,
David Wagner
:
Private Circuits: Securing Hardware against Probing Attacks. (.ps) 463-481
BibTeX
Symmetric Key Constructions
-
Shai Halevi
,
Phillip Rogaway
:
A Tweakable Enciphering Mode. (.ps) 482-499
BibTeX -
Matthew Cary
,
Ramarathnam Venkatesan
:
A Message Authentication Code Based on Unimodular Matrix Groups. (.ps) 500-512
BibTeX -
Jacques Patarin
:
Luby-Rackoff: 7 Rounds Are Enough for 2 n(1-epsilon) Security. 513-529
BibTeX
New Models
-
Omer Horvitz
,
Virgil D. Gligor
:
Weak Key Authenticity and the Computational Completeness of Formal Encryption. (.ps) 530-547
BibTeX -
Jonathan Herzog
,
Moses Liskov
,
Silvio Micali
:
Plaintext Awareness via Key Registration. (.ps) 548-564
BibTeX -
Ran Canetti
,
Hugo Krawczyk
,
Jesper Buus Nielsen
:
Relaxing Chosen-Ciphertext Security. (.ps) 565-582
BibTeX
Symmetric Key Cryptanalysis II
-
Brice Canvel
,
Alain P. Hiltgen
,
Serge Vaudenay
,
Martin Vuagnoux
:
Password Interception in a SSL/TLS Channel. (.ps) 583-599
BibTeX -
Elad Barkan
,
Eli Biham
,
Nathan Keller
:
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. (.ps) 600-616
BibTeX -
Philippe Oechslin
:
Making a Faster Cryptanalytic Time-Memory Trade-Off. (.ps) 617-630
BibTeX