PKC 2003:
PKC 2003: Miami, Florida, USA
Yvo Desmedt (Ed.):Public Key Cryptography - PKC 2003, 6th International Workshop on
Theory and Practice in Public Key Cryptography, Miami, FL, USA,
January 6-8, 2003, Proceedings.
Diffie-Hellman Based Schemes
-
Yevgeniy Dodis
:
Efficient Construction of (Distributed) Verifiable Random Functions , 1-17, BibTeX -
Jae Choon Cha
,
Jung Hee Cheon
:
An Identity-Based Signature from Gap Diffie-Hellman Groups , 18-30, BibTeX
Threshold Cryptography
-
Alexandra Boldyreva
:
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme , 31-46, BibTeX -
Philip D. MacKenzie
:
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack , 47-61, BibTeX
Reduction Proofs
-
Mats Näslund
,
Igor Shparlinski
,
William Whyte
:
On the Bit Security of NTRUEncrypt , 62-70, BibTeX -
Yodai Watanabe
,
Junji Shikata
,
Hideki Imai
:
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks , 71-84, BibTeX
Broadcast and Tracing
-
Mihir Bellare
,
Alexandra Boldyreva
,
Jessica Staddon
:
Randomness Re-use in Multi-recipient Encryption Schemeas , 85-99, BibTeX -
Yevgeniy Dodis
,
Nelly Fazio
:
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , 100-115, BibTeX
Digital Signatures
-
Marc Fischlin
:
The Cramer-Shoup Strong-RSASignature Scheme Revisited , 116-129, BibTeX -
Yevgeniy Dodis
,
Jonathan Katz
,
Shouhuai Xu
,
Moti Yung
:
Strong Key-Insulated Signature Schemes , 130-144, BibTeX
Specialized Multiparty Cryptography
-
Jens Groth
:
A Verifiable Secret Shuffle of Homomorphic Encryptions , 145-160, BibTeX -
Colin Boyd
,
Juan Manuel González Nieto
:
Round-Optimal Contributory Conference Key Agreement , 161-174, BibTeX
Cryptanalysis I
-
Christian Tobias
:
Security Analysis of the MOR Cryptosystem , 175-186, BibTeX -
Dennis Hofheinz
,
Rainer Steinwandt
:
A Practical Attack on Some Braid Group Based Cryptographic Primitives , 187-198, BibTeX
Elliptic Curves: Implementation Attacks
-
Louis Goubin
:
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems , 199-210, BibTeX -
Adrian Antipa
,
Daniel R. L. Brown
,
Alfred Menezes
,
René Struik
,
Scott A. Vanstone
:
Validation of Elliptic Curve Public Keys , 211-223, BibTeX -
Tetsuya Izu
,
Tsuyoshi Takagi
:
Exceptional Procedure Attack on Elliptic Curve Cryptosystems , 224-239, BibTeX
Implementation and Hardware Issues
-
Martijn Stam
:
On Montgomery-Like Representationsfor Elliptic Curves over GF(2 k ) , 240-253, BibTeX -
Willi Geiselmann
,
Rainer Steinwandt
:
A Dedicated Sieving Hardware , 254-266, BibTeX -
Mehdi-Laurent Akkar
,
Nicolas Courtois
,
Romain Duteuil
,
Louis Goubin
:
A Fast and Secure Implementation of Sflash , 267-278, BibTeX
New Public Key Schemes
-
David Galindo
,
Sebastià Martín Molleví
,
Paz Morillo
,
Jorge Luis Villar
:
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes , 279-291, BibTeX -
Seong-Hun Paeng
,
Bae Eun Jung
,
Kil-Chan Ha
:
A Lattice Based Public Key Cryptosystem Using Polynomial Representations , 292-308, BibTeX
Elliptic Curves: General Issues
-
Serge Vaudenay
:
The Security of DSA and ECDSA , 309-323, BibTeX -
Ulrich Kühn
:
Side-Channel Attacks on Textbook RSA and ElGamal Encryption , 324-336, BibTeX -
Nicolas Courtois
,
Magnus Daum
,
Patrick Felke
:
On the Security of HFE, HFEv- and Quartz , 337-350, BibTeX -
Nicolas Courtois
:
Generic Attacks and the Security of Quartz , 351-364, BibTeX