| 2003 | A Fast Signature Scheme Based on New On-line Computation. Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto |
| 2003 | A Logic Model for Temporal Authorization Delegation with Negation. Chun Ruan, Vijay Varadharajan, Yan Zhang |
| 2003 | A Note on Weak Keys of PES, IDEA, and Some Extended Variants. Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
| 2003 | Analysis of the Insecurity of ECMQV with Partially Known Nonces. Peter James Leadbitter, Nigel P. Smart |
| 2003 | Cryptanalysis of an Algebraic Privacy Homomorphism. David A. Wagner |
| 2003 | Cryptographically Generated Addresses (CGA). Tuomas Aura |
| 2003 | Designated Verification of Non-invertible Watermark. HyeJoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim |
| 2003 | Distributed RSA Signature Schemes for General Access Structures. Javier Herranz, Carles Padró, Germán Sáez |
| 2003 | Divisible Voting Scheme. Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata |
| 2003 | Easy Verifiable Primitives and Practical Public Key Cryptosystems. David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
| 2003 | Enabling Shared Audit Data. Adrian Baldwin, Simon Shiu |
| 2003 | Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. Yvo Desmedt, Kaoru Kurosawa, Tri Van Le |
| 2003 | Foundations of Differential Cryptanalysis in Abelian Groups. Tomasz Tyksinski |
| 2003 | Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES. Akashi Satoh, Sumio Morioka |
| 2003 | Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings Colin Boyd, Wenbo Mao |
| 2003 | Intrinsic Limitations of Digital Signatures and How to Cope with Them. Ueli M. Maurer |
| 2003 | On the Security of Fair Non-repudiation Protocols. Sigrid Gürgens, Carsten Rudolph, Holger Vogt |
| 2003 | Proactive Software Tampering Detection. Hongxia Jin, Jeffery Lotspiech |
| 2003 | Reactively Secure Signature Schemes. Michael Backes, Birgit Pfitzmann, Michael Waidner |
| 2003 | Revisiting Software Protection. Paul C. van Oorschot |
| 2003 | Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits. Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee |
| 2003 | Security Analysis of a Password Authenticated Key Exchange Protocol. Feng Bao |
| 2003 | Short c-Secure Fingerprinting Codes. Tri Van Le, Mike Burmester, Jiangyi Hu |
| 2003 | Single Sign-On Using Trusted Platforms. Andreas Pashalidis, Chris J. Mitchell |
| 2003 | Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto |
| 2003 | The Design and Implementation of Protocol-Based Hidden Key Recovery. Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle |
| 2003 | The Role of Arbiters in Asymmetric Authentication Schemes. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai |
| 2003 | Towards a Business Process-Driven Framework for Security Engineering with the UML. José Luis Vivas, José A. Montenegro, Javier López |
| 2003 | Trust and Authorization in Pervasive B2E Scenarios. Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta |
| 2003 | Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai |
| 2003 | Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. Jianying Zhou, Feng Bao, Robert H. Deng |
| 2003 | Validating and Securing Spontaneous Associations between Wireless Devices. Tim Kindberg, Kan Zhang |
| 2003 | Zero-Distortion Authentication Watermarking. Yongdong Wu |
| 2003 | Zero-Value Point Attacks on Elliptic Curve Cryptosystem. Toru Akishita, Tsuyoshi Takagi |