Conferences in DBLP
Antoine Joux Cryptanalysis of the EMD Mode of Operation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:1-16 [Conf ] Pascal Junod On the Optimality of Linear, Differential, and Sequential Distinguishers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:17-32 [Conf ] Alex Biryukov , Christophe De Cannière , An Braeken , Bart Preneel A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:33-50 [Conf ] Matthias Fitzi , Martin Hirt , Thomas Holenstein , Jürg Wullschleger Two-Threshold Broadcast and Detectable Multi-party Computation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:51-67 [Conf ] Ran Canetti , Eyal Kushilevitz , Yehuda Lindell On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:68-86 [Conf ] Benny Pinkas Fair Secure Two-Party Computation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:87-105 [Conf ] Kris Gaj , Arkadiusz Orlowski Facts and Myths of Enigma: Breaking Stereotypes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:106-122 [Conf ] Yunlei Zhao , Xiaotie Deng , Chan H. Lee , Hong Zhu Resettable Zero-Knowledge in the Weak Public-Key Model. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:123-139 [Conf ] Daniele Micciancio , Erez Petrank Simulatable Commitments and Efficient Concurrent Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:140-159 [Conf ] Rafael Pass Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:160-176 [Conf ] Juan A. Garay , Philip D. MacKenzie , Ke Yang Strengthening Zero-Knowledge Protocols Using Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:177-194 [Conf ] Gustav Hast Nearly One-Sided Tests and the Goldreich-Levin Predicate. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:195-210 [Conf ] Jonathan Katz Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:211-228 [Conf ] Daniel Augot , Matthieu Finiasz A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:229-240 [Conf ] Yehuda Lindell A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:241-254 [Conf ] Ran Canetti , Shai Halevi , Jonathan Katz A Forward-Secure Public-Key Encryption Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:255-271 [Conf ] Craig Gentry Certificate-Based Encryption and the Certificate Revocation Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:272-293 [Conf ] Luis von Ahn , Manuel Blum , Nicholas J. Hopper , John Langford CAPTCHA: Using Hard AI Problems for Security. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:294-311 [Conf ] Yevgeniy Dodis , Jee Hea An Concealment and Its Applications to Authenticated Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:312-329 [Conf ] Patrik Ekdahl , Willi Meier , Thomas Johansson Predicting the Shrinking Generator with Fixed Connections. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:330-344 [Conf ] Nicolas Courtois , Willi Meier Algebraic Attacks on Stream Ciphers with Linear Feedback. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:345-359 [Conf ] Reynald Lercier , David Lubicz Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic Time. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:360-373 [Conf ] Florian Hess The GHS Attack Revisited. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:374-387 [Conf ] Mathieu Ciet , Tanja Lange , Francesco Sica , Jean-Jacques Quisquater Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:388-400 [Conf ] Eu-Jin Goh , Stanislaw Jarecki A Signature Scheme as Secure as the Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:401-415 [Conf ] Dan Boneh , Craig Gentry , Ben Lynn , Hovav Shacham Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:416-432 [Conf ] Michael Szydlo Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:433-448 [Conf ] Jacques Stern Why Provable Security Matters? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:449-461 [Conf ] Pierre-Alain Fouque , Guillaume Poupard On the Security of RDSA. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:462-476 [Conf ] Eonkyung Lee , Je Hong Park Cryptanalysis of the Public-Key Encryption Based on Braid Groups. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:477-490 [Conf ] Mihir Bellare , Tadayoshi Kohno A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:491-506 [Conf ] Mario Di Raimondo , Rosario Gennaro Provably Secure Threshold Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:507-523 [Conf ] Rosario Gennaro , Yehuda Lindell A Framework for Password-Based Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:524-543 [Conf ] Ueli M. Maurer , Krzysztof Pietrzak The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:544-561 [Conf ] Renato Renner , Stefan Wolf New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:562-577 [Conf ] Jonathan Katz , Rafail Ostrovsky , Adam Smith Round Efficiency of Multi-party Computation with a Dishonest Majority. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:578-595 [Conf ] Ronald Cramer , Serge Fehr , Yuval Ishai , Eyal Kushilevitz Efficient Multi-party Computation over Rings. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:596-613 [Conf ] Mihir Bellare , Daniele Micciancio , Bogdan Warinschi Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:614-629 [Conf ] Aggelos Kiayias , Moti Yung Extracting Group Signatures from Traitor Tracing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:630-648 [Conf ]