Conferences in DBLP
Mihir Bellare , Bennet S. Yee Forward-Security in Private-Key Cryptography. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:1-18 [Conf ] Yevgeniy Dodis , Matthew K. Franklin , Jonathan Katz , Atsuko Miyaji , Moti Yung Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:19-32 [Conf ] Kaoru Kurosawa , Tetsu Iwata TMAC: Two-Key CBC MAC. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:33-49 [Conf ] Douglas L. Whiting , Michael J. Sabin Montgomery Prime Hashing for Message Authentication. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:50-67 [Conf ] Jung-Yeun Lee , Jung Hee Cheon , Seungjoo Kim An Analysis of Proxy Signatures: Is a Secure Channel Necessary? [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:68-79 [Conf ] Steven D. Galbraith , Wenbo Mao Invisibility and Anonymity of Undeniable and Confirmer Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:80-97 [Conf ] Dan Boneh , Ilya Mironov , Victor Shoup A Secure Signature Scheme from Bilinear Maps. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:98-110 [Conf ] Nigel P. Smart Access Control Using Pairing Based Cryptography. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:111-121 [Conf ] Jeffrey Hoffstein , Nick Howgrave-Graham , Jill Pipher , Joseph H. Silverman , William Whyte NTRUSIGN: Digital Signatures Using the NTRU Lattice. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:122-140 [Conf ] Nicolas Courtois , Jacques Patarin About the XL Algorithm over GF(2). [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:141-157 [Conf ] Guido Bertoni , Jorge Guajardo , Sandeep S. Kumar , Gerardo Orlando , Christof Paar , Thomas J. Wollinger Efficient GF(pm ) Arithmetic Architectures for Cryptographic Applications. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:158-175 [Conf ] Lu Xiao , Howard M. Heys Hardware Performance Characterization of Block Cipher Structures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:176-192 [Conf ] Xuhua Ding , Gene Tsudik Simple Identity-Based Cryptography with Mediated RSA. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:193-210 [Conf ] John Malone-Lee , Wenbo Mao Two Birds One Stone: Signcryption Using RSA. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:211-225 [Conf ] Thomas A. Berson Cryptography after the Bubble: How to Make an Impact on the World. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:226- [Conf ] Seungjoo Kim , Masahiro Mambo , Yuliang Zheng Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:227-243 [Conf ] Bodo Möller Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:244-262 [Conf ] Paolo D'Arco , Douglas R. Stinson Fault Tolerant and DistributedBroadcast Encryption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:263-280 [Conf ] Huaxiong Wang , Josef Pieprzyk Shared Generation of Pseudo-Random Functions with Cumulative Maps. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:281-294 [Conf ] Michael T. Goodrich , Roberto Tamassia , Nikos Triandopoulos , Robert F. Cohen Authenticated Data Structures for Graph and Geometric Searching. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:295-313 [Conf ] Markus Jakobsson , Frank Thomson Leighton , Silvio Micali , Michael Szydlo Fractal Merkle Tree Representation and Traversal. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:314-326 [Conf ] Adi Shamir RSA Shortcuts. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:327- [Conf ] Katsuyuki Okeya , Tsuyoshi Takagi The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:328-342 [Conf ] Kirsten Eisenträger , Kristin Lauter , Peter L. Montgomery Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:343-354 [Conf ] Shouhuai Xu , Ravi S. Sandhu Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:355-372 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Secure Applications of Pedersen's Distributed Key Generation Protocol. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:373-390 [Conf ] Colin D. Walter Seeing through MIST Given a Small Fraction of an RSA Private Key. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:391-402 [Conf ] Claude Crépeau , Alain Slakmon Simple Backdoors for RSA Key Generation. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:403-416 [Conf ]