| 2003 | A Forward-Secure Public-Key Encryption Scheme. Ran Canetti, Shai Halevi, Jonathan Katz |
| 2003 | A Framework for Password-Based Authenticated Key Exchange. Rosario Gennaro, Yehuda Lindell |
| 2003 | A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem. Daniel Augot, Matthieu Finiasz |
| 2003 | A Signature Scheme as Secure as the Diffie-Hellman Problem. Eu-Jin Goh, Stanislaw Jarecki |
| 2003 | A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions. Yehuda Lindell |
| 2003 | A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. Mihir Bellare, Tadayoshi Kohno |
| 2003 | A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms. Alex Biryukov, Christophe De Cannière, An Braeken, Bart Preneel |
| 2003 | Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings Eli Biham |
| 2003 | Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham |
| 2003 | Algebraic Attacks on Stream Ciphers with Linear Feedback. Nicolas T. Courtois, Willi Meier |
| 2003 | CAPTCHA: Using Hard AI Problems for Security. Luis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford |
| 2003 | Certificate-Based Encryption and the Certificate Revocation Problem. Craig Gentry |
| 2003 | Concealment and Its Applications to Authenticated Encryption. Yevgeniy Dodis, Jee Hea An |
| 2003 | Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic Time. Reynald Lercier, David Lubicz |
| 2003 | Cryptanalysis of the EMD Mode of Operation. Antoine Joux |
| 2003 | Cryptanalysis of the Public-Key Encryption Based on Braid Groups. Eonkyung Lee, Je Hong Park |
| 2003 | Efficient Multi-party Computation over Rings. Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz |
| 2003 | Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications. Jonathan Katz |
| 2003 | Extracting Group Signatures from Traitor Tracing Schemes. Aggelos Kiayias, Moti Yung |
| 2003 | Facts and Myths of Enigma: Breaking Stereotypes. Kris Gaj, Arkadiusz Orlowski |
| 2003 | Fair Secure Two-Party Computation. Benny Pinkas |
| 2003 | Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. Mihir Bellare, Daniele Micciancio, Bogdan Warinschi |
| 2003 | Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures. Michael Szydlo |
| 2003 | Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms. Mathieu Ciet, Tanja Lange, Francesco Sica, Jean-Jacques Quisquater |
| 2003 | Nearly One-Sided Tests and the Goldreich-Levin Predicate. Gustav Hast |
| 2003 | New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction. Renato Renner, Stefan Wolf |
| 2003 | On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions. Ran Canetti, Eyal Kushilevitz, Yehuda Lindell |
| 2003 | On the Optimality of Linear, Differential, and Sequential Distinguishers. Pascal Junod |
| 2003 | On the Security of RDSA. Pierre-Alain Fouque, Guillaume Poupard |
| 2003 | Predicting the Shrinking Generator with Fixed Connections. Patrik Ekdahl, Willi Meier, Thomas Johansson |
| 2003 | Provably Secure Threshold Password-Authenticated Key Exchange. Mario Di Raimondo, Rosario Gennaro |
| 2003 | Resettable Zero-Knowledge in the Weak Public-Key Model. Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu |
| 2003 | Round Efficiency of Multi-party Computation with a Dishonest Majority. Jonathan Katz, Rafail Ostrovsky, Adam D. Smith |
| 2003 | Simulatable Commitments and Efficient Concurrent Zero-Knowledge. Daniele Micciancio, Erez Petrank |
| 2003 | Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition. Rafael Pass |
| 2003 | Strengthening Zero-Knowledge Protocols Using Signatures. Juan A. Garay, Philip D. MacKenzie, Ke Yang |
| 2003 | The GHS Attack Revisited. Florian Hess |
| 2003 | The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations. Ueli M. Maurer, Krzysztof Pietrzak |
| 2003 | Two-Threshold Broadcast and Detectable Multi-party Computation. Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger |
| 2003 | Why Provable Security Matters? Jacques Stern |