The SCEAS System
Navigation Menu

Conferences in DBLP

The Cryptographer's Track at RSA Conference (CT-RSA) (ctrsa)
2003 (conf/ctrsa/2003)

  1. Mihir Bellare, Bennet S. Yee
    Forward-Security in Private-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:1-18 [Conf]
  2. Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung
    Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:19-32 [Conf]
  3. Kaoru Kurosawa, Tetsu Iwata
    TMAC: Two-Key CBC MAC. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:33-49 [Conf]
  4. Douglas L. Whiting, Michael J. Sabin
    Montgomery Prime Hashing for Message Authentication. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:50-67 [Conf]
  5. Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim
    An Analysis of Proxy Signatures: Is a Secure Channel Necessary? [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:68-79 [Conf]
  6. Steven D. Galbraith, Wenbo Mao
    Invisibility and Anonymity of Undeniable and Confirmer Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:80-97 [Conf]
  7. Dan Boneh, Ilya Mironov, Victor Shoup
    A Secure Signature Scheme from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:98-110 [Conf]
  8. Nigel P. Smart
    Access Control Using Pairing Based Cryptography. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:111-121 [Conf]
  9. Jeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte
    NTRUSIGN: Digital Signatures Using the NTRU Lattice. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:122-140 [Conf]
  10. Nicolas Courtois, Jacques Patarin
    About the XL Algorithm over GF(2). [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:141-157 [Conf]
  11. Guido Bertoni, Jorge Guajardo, Sandeep S. Kumar, Gerardo Orlando, Christof Paar, Thomas J. Wollinger
    Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:158-175 [Conf]
  12. Lu Xiao, Howard M. Heys
    Hardware Performance Characterization of Block Cipher Structures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:176-192 [Conf]
  13. Xuhua Ding, Gene Tsudik
    Simple Identity-Based Cryptography with Mediated RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:193-210 [Conf]
  14. John Malone-Lee, Wenbo Mao
    Two Birds One Stone: Signcryption Using RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:211-225 [Conf]
  15. Thomas A. Berson
    Cryptography after the Bubble: How to Make an Impact on the World. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:226- [Conf]
  16. Seungjoo Kim, Masahiro Mambo, Yuliang Zheng
    Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:227-243 [Conf]
  17. Bodo Möller
    Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:244-262 [Conf]
  18. Paolo D'Arco, Douglas R. Stinson
    Fault Tolerant and DistributedBroadcast Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:263-280 [Conf]
  19. Huaxiong Wang, Josef Pieprzyk
    Shared Generation of Pseudo-Random Functions with Cumulative Maps. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:281-294 [Conf]
  20. Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, Robert F. Cohen
    Authenticated Data Structures for Graph and Geometric Searching. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:295-313 [Conf]
  21. Markus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo
    Fractal Merkle Tree Representation and Traversal. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:314-326 [Conf]
  22. Adi Shamir
    RSA Shortcuts. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:327- [Conf]
  23. Katsuyuki Okeya, Tsuyoshi Takagi
    The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:328-342 [Conf]
  24. Kirsten Eisenträger, Kristin Lauter, Peter L. Montgomery
    Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:343-354 [Conf]
  25. Shouhuai Xu, Ravi S. Sandhu
    Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:355-372 [Conf]
  26. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Applications of Pedersen's Distributed Key Generation Protocol. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:373-390 [Conf]
  27. Colin D. Walter
    Seeing through MIST Given a Small Fraction of an RSA Private Key. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:391-402 [Conf]
  28. Claude Crépeau, Alain Slakmon
    Simple Backdoors for RSA Key Generation. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:403-416 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002