Skip to main content
  • Conference proceedings
  • © 2003

Topics in Cryptology -- CT-RSA 2003

The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA April 13-17, 2003, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2612)

Conference series link(s): CT-RSA: Cryptographers’ Track at the RSA Conference

Conference proceedings info: CT-RSA 2003.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

    Pages I-XI
  2. Key Self-protection

    1. Forward-Security in Private-Key Cryptography

      • Mihir Bellare, Bennet Yee
      Pages 1-18
    2. Intrusion-Resilient Public-Key Encryption

      • Yevgeniy Dodis, Matt Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung
      Pages 19-32
  3. Message Authentication

    1. TMAC: Two-Key CBC MAC

      • Kaoru Kurosawa, Tetsu Iwata
      Pages 33-49
    2. Montgomery Prime Hashing for Message Authentication

      • Douglas L. Whiting, Michael J. Sabin
      Pages 50-67
  4. Digital Signatures

    1. An Analysis of Proxy Signatures: Is a Secure Channel Necessary?

      • Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim
      Pages 68-79
    2. Invisibility and Anonymity of Undeniable and Confirmer Signatures

      • Steven D. Galbraith, Wenbo Mao
      Pages 80-97
  5. Pairing Based Cryptography

    1. A Secure Signature Scheme from Bilinear Maps

      • Dan Boneh, Ilya Mironov, Victor Shoup
      Pages 98-110
  6. Multivariate and Lattice Problems

    1. NTRUSign: Digital Signatures Using the NTRU Lattice

      • Jeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte
      Pages 122-140
    2. About the XL Algorithm over GF(2)

      • Nicolas T. Courtois, Jacques Patarin
      Pages 141-157
  7. Cryptographic Architectures

    1. Efficient GF(p m) Arithmetic Architectures for Cryptographic Applications

      • Guido Bertoni, Jorge Guajardo, Sandeep Kumar, Gerardo Orlando, Christof Paar, Thomas Wollinger
      Pages 158-175
  8. New RSA-based Cryptosystems

    1. Simple Identity-Based Cryptography with Mediated RSA

      • Xuhua Ding, Gene Tsudik
      Pages 193-210
    2. Two Birds One Stone: Signcryption Using RSA

      • John Malone-Lee, Wenbo Mao
      Pages 211-226
  9. Chosen-Ciphertext Security

    1. Rethinking Chosen-Ciphertext Security under Kerckhoffs’ Assumption

      • Seungjoo Kim, Masahiro Mambo, Yuliang Zheng
      Pages 227-243
  10. Broadcast Encryption and PRF Sharing

    1. Fault Tolerant and Distributed Broadcast Encryption

      • Paolo D’Arco, Douglas R. Stinson
      Pages 263-280
    2. Shared Generation of Pseudo-Random Functions with Cumulative Maps

      • Huaxiong Wang, Josef Pieprzyk
      Pages 281-295

Other Volumes

  1. Topics in Cryptology — CT-RSA 2003

Editors and Affiliations

  • Gemplus, Card Security Group, La Ciotat Cedex, France

    Marc Joye

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access