| 2003 | A Designer's Guide to KEMs. Alexander W. Dent |
| 2003 | A General Attack Model on Hash-Based Client Puzzles. Geraint Price |
| 2003 | A General Construction of IND-CCA2 Secure Public Key Encryption. Eike Kiltz, John Malone-Lee |
| 2003 | A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes. Lina Fagoonee, Bahram Honary |
| 2003 | A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002. Werner Schindler |
| 2003 | Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. Thomas Johansson |
| 2003 | Analysis of Double Block Length Hash Functions. Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida |
| 2003 | Commitment Capacity of Discrete Memoryless Channels. Andreas J. Winter, Anderson C. A. Nascimento, Hideki Imai |
| 2003 | Computing the M = U U Katharina Geißler, Nigel P. Smart |
| 2003 | Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups. George Petrides |
| 2003 | Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings Kenneth G. Paterson |
| 2003 | Cryptography in Wireless Standards: (Invited Paper). Valtteri Niemi |
| 2003 | Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class. Enes Pasalic |
| 2003 | Differential Uniformity for Arrays. Kathy J. Horadam |
| 2003 | Efficient Key Updating Signature Schemes Based on IBS. Dae Hyun Yum, Pil Joong Lee |
| 2003 | Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic. Robert Granger |
| 2003 | High Rate Convolutional Codes with Optimal Cycle Weights. Eirik Rosnes, Øyvind Ytrehus |
| 2003 | Improved Fast Correlation Attack Using Low Rate Codes. Håvard Molland, John Erik Mathiassen, Tor Helleseth |
| 2003 | Mental Poker Revisited. Adam Barnett, Nigel P. Smart |
| 2003 | More Detail for a Combined Timing and Power Attack against Implementations of RSA. Werner Schindler, Colin D. Walter |
| 2003 | On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. Tetsu Iwata, Kaoru Kurosawa |
| 2003 | On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions. Yuri L. Borissov, An Braeken, Svetla Nikova, Bart Preneel |
| 2003 | Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity. Harald Niederreiter, Igor E. Shparlinski |
| 2003 | Predicting the Inversive Generator. Simon R. Blackburn, Domingo Gómez-Pérez, Jaime Gutierrez, Igor E. Shparlinski |
| 2003 | Recent Developments in Array Error-Control Codes: (Invited Paper). Patrick Guy Farrell |
| 2003 | Remote User Authentication Using Public Information. Chris J. Mitchell |
| 2003 | Resolving Large Prime(s) Variants for Discrete Logarithm Computation. Andrew J. Holt, James H. Davenport |
| 2003 | Separating and Intersecting Properties of BCH and Kasami Codes. Hans Georg Schaathun, Tor Helleseth |
| 2003 | Tripartite Authenticated Key Agreement Protocols from Pairings. Sattam S. Al-Riyami, Kenneth G. Paterson |
| 2003 | Uses and Abuses of Cryptography (Invited Paper). Richard Walton |