Conferences in DBLP
Adi Shamir , Eran Tromer Factoring Large Number with the TWIRL Device. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:1-26 [Conf ] Johannes Blömer , Alexander May New Partial Key Exposure Attacks on RSA. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:27-43 [Conf ] Jean-Charles Faugère , Antoine Joux Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:44-60 [Conf ] Salil P. Vadhan On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:61-77 [Conf ] Renato Renner , Stefan Wolf Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:78-95 [Conf ] Moni Naor On Cryptographic Assumptions and Challenges. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:96-109 [Conf ] Jonathan Katz , Moti Yung Scalable Protocols for Authenticated Group Key Exchange. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:110-125 [Conf ] Jan Camenisch , Victor Shoup Practical Verifiable Encryption and Decryption of Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:126-144 [Conf ] Yuval Ishai , Joe Kilian , Kobbi Nissim , Erez Petrank Extending Oblivious Transfers Efficiently. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:145-161 [Conf ] Frederik Armknecht , Matthias Krause Algebraic Attacks on Combiners with Memory. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:162-175 [Conf ] Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:176-194 [Conf ] Alex Biryukov , Christophe De Cannière , Gustaf Dellkrantz Cryptanalysis of SAFER++. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:195-211 [Conf ] Jung Hee Cheon , Byungheup Jun A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:212-225 [Conf ] Nick Howgrave-Graham , Phong Q. Nguyen , David Pointcheval , John Proos , Joseph H. Silverman , Ari Singer , William Whyte The Impact of Decryption Failures on the Security of NTRU Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:226-246 [Conf ] Ivan Damgård , Jesper Buus Nielsen Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:247-264 [Conf ] Ran Canetti , Tal Rabin Universal Composition with Joint State. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:265-281 [Conf ] Daniele Micciancio , Salil P. Vadhan Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:282-298 [Conf ] Boaz Barak , Shien Jin Ong , Salil P. Vadhan Derandomization in Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:299-315 [Conf ] Rafael Pass On Deniability in the Common Reference String and Random Oracle Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:316-337 [Conf ] Qi Cheng Primality Proving via One Round in ECPP and One Iteration in AKS. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:338-348 [Conf ] Karl Rubin , Alice Silverberg Torus-Based Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:349-365 [Conf ] Yuichi Komano , Kazuo Ohta Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:366-382 [Conf ] Xavier Boyen Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:383-399 [Conf ] Hugo Krawczyk SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:400-425 [Conf ] Cynthia Dwork , Andrew Goldberg , Moni Naor On Memory-Bound Functions for Fighting Spam. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:426-444 [Conf ] Niv Buchbinder , Erez Petrank Lower and Upper Bounds on Obtaining History Independence. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:445-462 [Conf ] Yuval Ishai , Amit Sahai , David Wagner Private Circuits: Securing Hardware against Probing Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:463-481 [Conf ] Shai Halevi , Phillip Rogaway A Tweakable Enciphering Mode. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:482-499 [Conf ] Matthew Cary , Ramarathnam Venkatesan A Message Authentication Code Based on Unimodular Matrix Groups. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:500-512 [Conf ] Jacques Patarin Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon) Security. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:513-529 [Conf ] Omer Horvitz , Virgil D. Gligor Weak Key Authenticity and the Computational Completeness of Formal Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:530-547 [Conf ] Jonathan Herzog , Moses Liskov , Silvio Micali Plaintext Awareness via Key Registration. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:548-564 [Conf ] Ran Canetti , Hugo Krawczyk , Jesper Buus Nielsen Relaxing Chosen-Ciphertext Security. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:565-582 [Conf ] Brice Canvel , Alain P. Hiltgen , Serge Vaudenay , Martin Vuagnoux Password Interception in a SSL/TLS Channel. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:583-599 [Conf ] Elad Barkan , Eli Biham , Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:600-616 [Conf ] Philippe Oechslin Making a Faster Cryptanalytic Time-Memory Trade-Off. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:617-630 [Conf ]