| 2003 | A Message Authentication Code Based on Unimodular Matrix Groups. Matthew Cary, Ramarathnam Venkatesan |
| 2003 | A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. Jung Hee Cheon, Byungheup Jun |
| 2003 | A Tweakable Enciphering Mode. Shai Halevi, Phillip Rogaway |
| 2003 | Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings Dan Boneh |
| 2003 | Algebraic Attacks on Combiners with Memory. Frederik Armknecht, Matthias Krause |
| 2003 | Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. Jean-Charles Faugère, Antoine Joux |
| 2003 | Cryptanalysis of SAFER++. Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz |
| 2003 | Derandomization in Cryptography. Boaz Barak, Shien Jin Ong, Salil P. Vadhan |
| 2003 | Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. Yuichi Komano, Kazuo Ohta |
| 2003 | Extending Oblivious Transfers Efficiently. Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank |
| 2003 | Factoring Large Number with the TWIRL Device. Adi Shamir, Eran Tromer |
| 2003 | Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Nicolas T. Courtois |
| 2003 | Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Elad Barkan, Eli Biham, Nathan Keller |
| 2003 | Lower and Upper Bounds on Obtaining History Independence. Niv Buchbinder, Erez Petrank |
| 2003 | Luby-Rackoff: 7 Rounds Are Enough for 2 Jacques Patarin |
| 2003 | Making a Faster Cryptanalytic Time-Memory Trade-Off. Philippe Oechslin |
| 2003 | Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). Xavier Boyen |
| 2003 | New Partial Key Exposure Attacks on RSA. Johannes Blömer, Alexander May |
| 2003 | On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model. Salil P. Vadhan |
| 2003 | On Cryptographic Assumptions and Challenges. Moni Naor |
| 2003 | On Deniability in the Common Reference String and Random Oracle Model. Rafael Pass |
| 2003 | On Memory-Bound Functions for Fighting Spam. Cynthia Dwork, Andrew V. Goldberg, Moni Naor |
| 2003 | Password Interception in a SSL/TLS Channel. Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux |
| 2003 | Plaintext Awareness via Key Registration. Jonathan Herzog, Moses D. Liskov, Silvio Micali |
| 2003 | Practical Verifiable Encryption and Decryption of Discrete Logarithms. Jan Camenisch, Victor Shoup |
| 2003 | Primality Proving via One Round in ECPP and One Iteration in AKS. Qi Cheng |
| 2003 | Private Circuits: Securing Hardware against Probing Attacks. Yuval Ishai, Amit Sahai, David A. Wagner |
| 2003 | Relaxing Chosen-Ciphertext Security. Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen |
| 2003 | SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. Hugo Krawczyk |
| 2003 | Scalable Protocols for Authenticated Group Key Exchange. Jonathan Katz, Moti Yung |
| 2003 | Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More. Daniele Micciancio, Salil P. Vadhan |
| 2003 | The Impact of Decryption Failures on the Security of NTRU Encryption. Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte |
| 2003 | Torus-Based Cryptography. Karl Rubin, Alice Silverberg |
| 2003 | Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret. Renato Renner, Stefan Wolf |
| 2003 | Universal Composition with Joint State. Ran Canetti, Tal Rabin |
| 2003 | Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. Ivan Damgård, Jesper Buus Nielsen |
| 2003 | Weak Key Authenticity and the Computational Completeness of Formal Encryption. Omer Horvitz, Virgil D. Gligor |