Topics in Cryptology — CT-RSA 2003

The Cryptographers’ Track at the RSA Conference 2003 San Francisco, CA, USA, April 13–17, 2003 Proceedings

Editors:

ISBN: 978-3-540-00847-7 (Print) 978-3-540-36563-1 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Key Self-protection

    1. No Access

      Book Chapter

      Pages 1-18

      Forward-Security in Private-Key Cryptography

    2. No Access

      Book Chapter

      Pages 19-32

      Intrusion-Resilient Public-Key Encryption

  2. Message Authentication

    1. No Access

      Book Chapter

      Pages 33-49

      TMAC: Two-Key CBC MAC

    2. No Access

      Book Chapter

      Pages 50-67

      Montgomery Prime Hashing for Message Authentication

  3. Digital Signatures

    1. No Access

      Book Chapter

      Pages 68-79

      An Analysis of Proxy Signatures: Is a Secure Channel Necessary?

    2. No Access

      Book Chapter

      Pages 80-97

      Invisibility and Anonymity of Undeniable and Confirmer Signatures

  4. Pairing Based Cryptography

    1. No Access

      Book Chapter

      Pages 98-110

      A Secure Signature Scheme from Bilinear Maps

    2. No Access

      Book Chapter

      Pages 111-121

      Access Control Using Pairing Based Cryptography

  5. Multivariate and Lattice Problems

    1. No Access

      Book Chapter

      Pages 122-140

      NTRUSign: Digital Signatures Using the NTRU Lattice

    2. No Access

      Book Chapter

      Pages 141-157

      About the XL Algorithm over GF(2)

  6. Cryptographic Architectures

    1. No Access

      Book Chapter

      Pages 158-175

      Efficient GF(p m ) Arithmetic Architectures for Cryptographic Applications

    2. No Access

      Book Chapter

      Pages 176-192

      Hardware Performance Characterization of Block Cipher Structures

  7. New RSA-based Cryptosystems

    1. No Access

      Book Chapter

      Pages 193-210

      Simple Identity-Based Cryptography with Mediated RSA

    2. No Access

      Book Chapter

      Pages 211-226

      Two Birds One Stone: Signcryption Using RSA

  8. Invited Talk I

    1. No Access

      Book Chapter

      Pages 226-226

      Cryptography after the Bubble: How to Make an Impact on the World

  9. Chosen-Ciphertext Security

    1. No Access

      Book Chapter

      Pages 227-243

      Rethinking Chosen-Ciphertext Security under Kerckhoffs’ Assumption

    2. No Access

      Book Chapter

      Pages 244-262

      Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes

  10. Broadcast Encryption and PRF Sharing

    1. No Access

      Book Chapter

      Pages 263-280

      Fault Tolerant and Distributed Broadcast Encryption

    2. No Access

      Book Chapter

      Pages 281-295

      Shared Generation of Pseudo-Random Functions with Cumulative Maps

  11. Authentication Structures

    1. No Access

      Book Chapter

      Pages 295-313

      Authenticated Data Structures for Graph and Geometric Searching

previous Page of 2