ASIACRYPT A

34 papers

YearTitle / Authors
2003A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi
2003A New Attack against Khazad.
Frédéric Muller
2003A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications.
Emmanuel Bresson, Dario Catalano, David Pointcheval
2003A Traceable Block Cipher.
Olivier Billet, Henri Gilbert
2003Accumulating Composites and Improved Group Signing.
Gene Tsudik, Shouhuai Xu
2003Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings
Chi-Sung Laih
2003Almost Uniform Density of Power Residues and the Provable Security of ESIGN.
Tatsuaki Okamoto, Jacques Stern
2003An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
2003Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption.
Jean-Sébastien Coron, David Naccache
2003Certificateless Public Key Cryptography.
Sattam S. Al-Riyami, Kenneth G. Paterson
2003Chosen-Ciphertext Security without Redundancy.
Duong Hieu Phan, David Pointcheval
2003Cryptanalysis of 3-Pass HAVAL.
Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle
2003Efficient Group Signatures without Trapdoors.
Giuseppe Ateniese, Breno de Medeiros
2003Efficient One-Time Proxy Signatures.
Huaxiong Wang, Josef Pieprzyk
2003Factoring Estimates for a 1024-Bit RSA Modulus.
Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James P. Hughes, Paul C. Leyland
2003Generalized Powering Functions and Their Application to Digital Signatures.
Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi
2003Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking.
Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh
2003Index Calculus Attack for Hyperelliptic Curves of Small Genus.
Nicolas Thériault
2003Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy.
Miodrag J. Mihaljevic
2003Leakage-Resilient Authenticated Key Establishment Protocols.
SeongHan Shin, Kazukuni Kobara, Hideki Imai
2003New Parallel Domain Extenders for UOWHF.
Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi
2003On Class Group Computations Using the Number Field Sieve.
Mark L. Bauer, Safuat Hamdy
2003On Diophantine Complexity and Statistical Zero-Knowledge Arguments.
Helger Lipmaa
2003Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves.
Pradeep Kumar Mishra, Palash Sarkar
2003Rotations and Translations of Number Field Sieve Polynomials.
Jason E. Gower
2003Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai
2003Some RSA-Based Encryption Schemes with Tight Security Reduction.
Kaoru Kurosawa, Tsuyoshi Takagi
2003Tate Pairing Implementation for Hyperelliptic Curves y
Iwan M. Duursma, Hyang-Sook Lee
2003The AGM-X
David R. Kohel
2003The Insecurity of Esign in Practical Implementations.
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard
2003The Secret and Beauty of Ancient Chinese Padlocks.
Hong-Sen Yan, Hsing-Hui Huang
2003Universal Designated-Verifier Signatures.
Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
2003Untraceable Fair Network Payment Protocols with Off-Line TTP.
Chih-Hung Wang
2003Verifiable Homomorphic Oblivious Transfer and Private Equality Test.
Helger Lipmaa