Cryptographers' World
 

PKC 2003


[Sort by page number] [Sort by citations count]

 
Yvo Desmedt, editor, Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings. Springer, 2002. ISBN 3-540-00324-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Jae Choon Cha,  Jung Hee Cheon,  An Identity-Based Signature from Gap Diffie-Hellman Groups, pp. 18 - 30, PKC 2003.

[Electronic Edition][Cited 543 times Red StarRed StarRed StarRed Star]

Alexandra Boldyreva,  Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme, pp. 31 - 46, PKC 2003.

[Electronic Edition][Cited 260 times Red StarRed StarRed Star]

Yevgeniy Dodis,  Jonathan Katz,  Shouhuai Xu,  Moti Yung,  Strong Key-Insulated Signature Schemes, pp. 130 - 144, PKC 2003.

[Electronic Edition][Cited 151 times Red StarRed Star]

Louis Goubin,  A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems, pp. 199 - 210, PKC 2003.

[Electronic Edition][Cited 136 times Red StarRed Star]

Jens Groth,  A Verifiable Secret Shuffle of Homomorphic Encryptions, pp. 145 - 160, PKC 2003.

[Electronic Edition][Cited 122 times Red StarRed Star]

Colin Boyd,  Juan Manuel Gonz√°lez Nieto,  Round-Optimal Contributory Conference Key Agreement, pp. 161 - 174, PKC 2003.

[Electronic Edition][Cited 115 times Red StarRed Star]

Yevgeniy Dodis,  Nelly Fazio,  Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack, pp. 100 - 115, PKC 2003.

[Electronic Edition][Cited 85 times Red Star]

Marc Fischlin,  The Cramer-Shoup Strong-RSA Signature Scheme Revisited, pp. 116 - 129, PKC 2003.

[Electronic Edition][Cited 68 times Red Star]

Dennis Hofheinz,  Rainer Steinwandt,  A Practical Attack on Some Braid Group Based Cryptographic Primitives, pp. 187 - 198, PKC 2003.

[Electronic Edition][Cited 53 times Red Star]

Mehdi-Laurent Akkar,  Nicolas Courtois,  Romain Duteuil,  Louis Goubin,  A Fast and Secure Implementation of Sflash, pp. 267 - 278, PKC 2003.

[Electronic Edition][Cited 48 times ]

Mihir Bellare,  Alexandra Boldyreva,  Jessica Staddon,  Randomness Re-use in Multi-recipient Encryption Schemes, pp. 85 - 99, PKC 2003.

[Electronic Edition][Cited 42 times ]

Nicolas Courtois,  Magnus Daum,  Patrick Felke,  On the Security of HFE, HFEv- and Quartz, pp. 337 - 350, PKC 2003.

[Electronic Edition][Cited 42 times ]

Yevgeniy Dodis,  Efficient Construction of (Distributed) Verifiable Random Functions, pp. 1 - 17, PKC 2003.

[Electronic Edition][Cited 41 times ]

Yodai Watanabe,  Junji Shikata,  Hideki Imai,  Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks, pp. 71 - 84, PKC 2003.

[Electronic Edition][Cited 29 times ]

Adrian Antipa,  Daniel R. L. Brown,  Alfred Menezes,  Ren√© Struik,  Scott A. Vanstone,  Validation of Elliptic Curve Public Keys, pp. 211 - 223, PKC 2003.

[Electronic Edition][Cited 25 times ]

Tetsuya Izu,  Tsuyoshi Takagi,  Exceptional Procedure Attack on Elliptic Curve Cryptosystems, pp. 224 - 239, PKC 2003.

[Electronic Edition][Cited 21 times ]

Willi Geiselmann,  Rainer Steinwandt,  A Dedicated Sieving Hardware, pp. 254 - 266, PKC 2003.

[Electronic Edition][Cited 20 times ]

David Galindo,  Sebasti√† Mart√≠n Mollev√≠,  Paz Morillo,  Jorge Luis Villar,  A Practical Public Key Cryptosystem from Paillier and Rabin Schemes, pp. 279 - 291, PKC 2003.

[Electronic Edition][Cited 16 times ]

Martijn Stam,  On Montgomery-Like Representations for Elliptic Curves over GF(2^k), pp. 240 - 253, PKC 2003.

[Electronic Edition][Cited 13 times ]

Nicolas Courtois,  Generic Attacks and the Security of Quartz, pp. 351 - 364, PKC 2003.

[Electronic Edition][Cited 12 times ]

Serge Vaudenay,  The Security of DSA and ECDSA, pp. 309 - 323, PKC 2003.

[Electronic Edition][Cited 9 times ]

Christian Tobias,  Security Analysis of the MOR Cryptosystem, pp. 175 - 186, PKC 2003.

[Electronic Edition][Cited 8 times ]

Seong-Hun Paeng,  Bae Eun Jung,  Kil-Chan Ha,  A Lattice Based Public Key Cryptosystem Using Polynomial Representations, pp. 292 - 308, PKC 2003.

[Electronic Edition][Cited 8 times ]

Philip D. MacKenzie,  An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack, pp. 47 - 61, PKC 2003.

[Electronic Edition][Cited 5 times ]

Mats N√§slund,  Igor Shparlinski,  William Whyte,  On the Bit Security of NTRUEncrypt, pp. 62 - 70, PKC 2003.

[Electronic Edition][Cited 3 times ]

Ulrich K√ľhn,  Side-Channel Attacks on Textbook RSA and ElGamal Encryption, pp. 324 - 336, PKC 2003.

[Electronic Edition][Cited 2 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...