| 2003 | A Secure Signature Scheme from Bilinear Maps. Dan Boneh, Ilya Mironov, Victor Shoup |
| 2003 | About the XL Algorithm over GF(2). Nicolas T. Courtois, Jacques Patarin |
| 2003 | Access Control Using Pairing Based Cryptography. Nigel P. Smart |
| 2003 | An Analysis of Proxy Signatures: Is a Secure Channel Necessary? Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim |
| 2003 | Authenticated Data Structures for Graph and Geometric Searching. Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, Robert F. Cohen |
| 2003 | Cryptography after the Bubble: How to Make an Impact on the World. Thomas A. Berson |
| 2003 | Efficient GF(p Guido Bertoni, Jorge Guajardo, Sandeep S. Kumar, Gerardo Orlando, Christof Paar, Thomas J. Wollinger |
| 2003 | Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery |
| 2003 | Fault Tolerant and DistributedBroadcast Encryption. Paolo D'Arco, Douglas R. Stinson |
| 2003 | Forward-Security in Private-Key Cryptography. Mihir Bellare, Bennet S. Yee |
| 2003 | Fractal Merkle Tree Representation and Traversal. Markus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo |
| 2003 | Hardware Performance Characterization of Block Cipher Structures. Lu Xiao, Howard M. Heys |
| 2003 | Intrusion-Resilient Public-Key Encryption. Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung |
| 2003 | Invisibility and Anonymity of Undeniable and Confirmer Signatures. Steven D. Galbraith, Wenbo Mao |
| 2003 | Montgomery Prime Hashing for Message Authentication. Douglas L. Whiting, Michael J. Sabin |
| 2003 | NTRUSIGN: Digital Signatures Using the NTRU Lattice. Jeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte |
| 2003 | Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes. Bodo Möller |
| 2003 | RSA Shortcuts. Adi Shamir |
| 2003 | Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. Seungjoo Kim, Masahiro Mambo, Yuliang Zheng |
| 2003 | Secure Applications of Pedersen's Distributed Key Generation Protocol. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
| 2003 | Seeing through MIST Given a Small Fraction of an RSA Private Key. Colin D. Walter |
| 2003 | Shared Generation of Pseudo-Random Functions with Cumulative Maps. Huaxiong Wang, Josef Pieprzyk |
| 2003 | Simple Backdoors for RSA Key Generation. Claude Crépeau, Alain Slakmon |
| 2003 | Simple Identity-Based Cryptography with Mediated RSA. Xuhua Ding, Gene Tsudik |
| 2003 | TMAC: Two-Key CBC MAC. Kaoru Kurosawa, Tetsu Iwata |
| 2003 | The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. Katsuyuki Okeya, Tsuyoshi Takagi |
| 2003 | Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings Marc Joye |
| 2003 | Two Birds One Stone: Signcryption Using RSA. John Malone-Lee, Wenbo Mao |
| 2003 | Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. Shouhuai Xu, Ravi S. Sandhu |