The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
2003 (conf/crypto/2003)

  1. Adi Shamir, Eran Tromer
    Factoring Large Number with the TWIRL Device. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:1-26 [Conf]
  2. Johannes Blömer, Alexander May
    New Partial Key Exposure Attacks on RSA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:27-43 [Conf]
  3. Jean-Charles Faugère, Antoine Joux
    Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:44-60 [Conf]
  4. Salil P. Vadhan
    On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:61-77 [Conf]
  5. Renato Renner, Stefan Wolf
    Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:78-95 [Conf]
  6. Moni Naor
    On Cryptographic Assumptions and Challenges. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:96-109 [Conf]
  7. Jonathan Katz, Moti Yung
    Scalable Protocols for Authenticated Group Key Exchange. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:110-125 [Conf]
  8. Jan Camenisch, Victor Shoup
    Practical Verifiable Encryption and Decryption of Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:126-144 [Conf]
  9. Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank
    Extending Oblivious Transfers Efficiently. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:145-161 [Conf]
  10. Frederik Armknecht, Matthias Krause
    Algebraic Attacks on Combiners with Memory. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:162-175 [Conf]
  11. Nicolas Courtois
    Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:176-194 [Conf]
  12. Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz
    Cryptanalysis of SAFER++. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:195-211 [Conf]
  13. Jung Hee Cheon, Byungheup Jun
    A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:212-225 [Conf]
  14. Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte
    The Impact of Decryption Failures on the Security of NTRU Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:226-246 [Conf]
  15. Ivan Damgård, Jesper Buus Nielsen
    Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:247-264 [Conf]
  16. Ran Canetti, Tal Rabin
    Universal Composition with Joint State. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:265-281 [Conf]
  17. Daniele Micciancio, Salil P. Vadhan
    Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:282-298 [Conf]
  18. Boaz Barak, Shien Jin Ong, Salil P. Vadhan
    Derandomization in Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:299-315 [Conf]
  19. Rafael Pass
    On Deniability in the Common Reference String and Random Oracle Model. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:316-337 [Conf]
  20. Qi Cheng
    Primality Proving via One Round in ECPP and One Iteration in AKS. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:338-348 [Conf]
  21. Karl Rubin, Alice Silverberg
    Torus-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:349-365 [Conf]
  22. Yuichi Komano, Kazuo Ohta
    Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:366-382 [Conf]
  23. Xavier Boyen
    Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:383-399 [Conf]
  24. Hugo Krawczyk
    SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:400-425 [Conf]
  25. Cynthia Dwork, Andrew Goldberg, Moni Naor
    On Memory-Bound Functions for Fighting Spam. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:426-444 [Conf]
  26. Niv Buchbinder, Erez Petrank
    Lower and Upper Bounds on Obtaining History Independence. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:445-462 [Conf]
  27. Yuval Ishai, Amit Sahai, David Wagner
    Private Circuits: Securing Hardware against Probing Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:463-481 [Conf]
  28. Shai Halevi, Phillip Rogaway
    A Tweakable Enciphering Mode. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:482-499 [Conf]
  29. Matthew Cary, Ramarathnam Venkatesan
    A Message Authentication Code Based on Unimodular Matrix Groups. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:500-512 [Conf]
  30. Jacques Patarin
    Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:513-529 [Conf]
  31. Omer Horvitz, Virgil D. Gligor
    Weak Key Authenticity and the Computational Completeness of Formal Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:530-547 [Conf]
  32. Jonathan Herzog, Moses Liskov, Silvio Micali
    Plaintext Awareness via Key Registration. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:548-564 [Conf]
  33. Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen
    Relaxing Chosen-Ciphertext Security. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:565-582 [Conf]
  34. Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux
    Password Interception in a SSL/TLS Channel. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:583-599 [Conf]
  35. Elad Barkan, Eli Biham, Nathan Keller
    Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:600-616 [Conf]
  36. Philippe Oechslin
    Making a Faster Cryptanalytic Time-Memory Trade-Off. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:617-630 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002