CRYPTO A*

37 papers

YearTitle / Authors
2003A Message Authentication Code Based on Unimodular Matrix Groups.
Matthew Cary, Ramarathnam Venkatesan
2003A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem.
Jung Hee Cheon, Byungheup Jun
2003A Tweakable Enciphering Mode.
Shai Halevi, Phillip Rogaway
2003Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings
Dan Boneh
2003Algebraic Attacks on Combiners with Memory.
Frederik Armknecht, Matthias Krause
2003Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases.
Jean-Charles Faugère, Antoine Joux
2003Cryptanalysis of SAFER++.
Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz
2003Derandomization in Cryptography.
Boaz Barak, Shien Jin Ong, Salil P. Vadhan
2003Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation.
Yuichi Komano, Kazuo Ohta
2003Extending Oblivious Transfers Efficiently.
Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank
2003Factoring Large Number with the TWIRL Device.
Adi Shamir, Eran Tromer
2003Fast Algebraic Attacks on Stream Ciphers with Linear Feedback.
Nicolas T. Courtois
2003Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.
Elad Barkan, Eli Biham, Nathan Keller
2003Lower and Upper Bounds on Obtaining History Independence.
Niv Buchbinder, Erez Petrank
2003Luby-Rackoff: 7 Rounds Are Enough for 2
Jacques Patarin
2003Making a Faster Cryptanalytic Time-Memory Trade-Off.
Philippe Oechslin
2003Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography).
Xavier Boyen
2003New Partial Key Exposure Attacks on RSA.
Johannes Blömer, Alexander May
2003On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model.
Salil P. Vadhan
2003On Cryptographic Assumptions and Challenges.
Moni Naor
2003On Deniability in the Common Reference String and Random Oracle Model.
Rafael Pass
2003On Memory-Bound Functions for Fighting Spam.
Cynthia Dwork, Andrew V. Goldberg, Moni Naor
2003Password Interception in a SSL/TLS Channel.
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux
2003Plaintext Awareness via Key Registration.
Jonathan Herzog, Moses D. Liskov, Silvio Micali
2003Practical Verifiable Encryption and Decryption of Discrete Logarithms.
Jan Camenisch, Victor Shoup
2003Primality Proving via One Round in ECPP and One Iteration in AKS.
Qi Cheng
2003Private Circuits: Securing Hardware against Probing Attacks.
Yuval Ishai, Amit Sahai, David A. Wagner
2003Relaxing Chosen-Ciphertext Security.
Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen
2003SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols.
Hugo Krawczyk
2003Scalable Protocols for Authenticated Group Key Exchange.
Jonathan Katz, Moti Yung
2003Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More.
Daniele Micciancio, Salil P. Vadhan
2003The Impact of Decryption Failures on the Security of NTRU Encryption.
Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte
2003Torus-Based Cryptography.
Karl Rubin, Alice Silverberg
2003Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret.
Renato Renner, Stefan Wolf
2003Universal Composition with Joint State.
Ran Canetti, Tal Rabin
2003Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption.
Ivan Damgård, Jesper Buus Nielsen
2003Weak Key Authenticity and the Computational Completeness of Formal Encryption.
Omer Horvitz, Virgil D. Gligor