| 2003 | A Fast Correlation Attack for LFSR-Based Stream Ciphers. Sarbani Palit, Bimal K. Roy, Arindom De |
| 2003 | A Key Recovery Mechanism for Reliable Group Key Management. Taenam Cho, Sang-Ho Lee |
| 2003 | A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. Chong-zhi Gao, Zheng-an Yao, Lei Li |
| 2003 | A Threshold GQ Signature Scheme. Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng |
| 2003 | An Authorization Model for E-consent Requirement in a Health Care Application. Chun Ruan, Vijay Varadharajan |
| 2003 | An Efficient Tree-Based Group Key Agreement Using Bilinear Map. Sangwon Lee, Yongdae Kim, Kwangjo Kim, Daehyun Ryu |
| 2003 | An IP Traceback Scheme Integrating DPM and PPM. Fan Min, Jun-Yan Zhang, Guo-wie Yang |
| 2003 | Anonymity-Enhanced Pseudonym System. Yuko Tamura, Atsuko Miyaji |
| 2003 | Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings Jianying Zhou, Moti Yung, Yongfei Han |
| 2003 | Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors. Johann Großschädl, Guy-Armand Kamendje |
| 2003 | Common Vulnerability Markup Language. Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang |
| 2003 | Differential Fault Analysis on A.E.S. Pierre Dusart, Gilles Letourneux, Olivier Vivolo |
| 2003 | Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park |
| 2003 | Efficient Distributed Signcryption Scheme as Group Signcryption. Dong Jin Kwak, Sang-Jae Moon |
| 2003 | Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun |
| 2003 | Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model. Sandeepan Chowdhury, Subhamoy Maitra |
| 2003 | Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary. Gene Itkis, Peng Xie |
| 2003 | Improved Algebraic Traitor Tracing Scheme. Chunyan Bai, Gui Liang Feng |
| 2003 | Improved Scalable Hash Chain Traversal. Sung-Ryul Kim |
| 2003 | Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng |
| 2003 | Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. Ching Lin, Vijay Varadharajan |
| 2003 | Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case. Ventzislav Nikov, Svetla Nikova, Bart Preneel |
| 2003 | On the Security of Two Threshold Signature Schemes with Traceable Signers. Guilin Wang, Xiaoxi Han, Bo Zhu |
| 2003 | Optimized Chi Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji |
| 2003 | PLI: A New Framework to Protect Digital Content for P2P Networks. Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang |
| 2003 | Proxy and Threshold One-Time Signatures. Mohamed Al-Ibrahim, Anton Cerný |
| 2003 | Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. Rui Zhang, Hideki Imai |
| 2003 | Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. Luciano Rila, Chris J. Mitchell |
| 2003 | Side-Channel Attack on Substitution Blocks. Roman Novak |
| 2003 | Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. Yasuyuki Sakai, Kouichi Sakurai |
| 2003 | Trust on Web Browser: Attack vs. Defense. Tieyan Li, Yongdong Wu |
| 2003 | Using Feedback to Improve Masquerade Detection. Kwong H. Yung |
| 2003 | Using OCSP to Secure Certificate-Using Transactions in M-commerce. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |