© 2003

Advances in Cryptology - CRYPTO 2003

23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings

  • Dan Boneh
Conference proceedings CRYPTO 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2729)

Table of contents

  1. Front Matter
  2. Public Key Cryptanalysis I

    1. Adi Shamir, Eran Tromer
      Pages 1-26
    2. Johannes Blömer, Alexander May
      Pages 27-43
  3. Alternate Adversary Models

  4. Invited Talk I

  5. Protocols

    1. Jonathan Katz, Moti Yung
      Pages 110-125
    2. Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank
      Pages 145-161
  6. Symmetric Key Cryptanalysis I

    1. Frederik Armknecht, Matthias Krause
      Pages 162-175
    2. Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz
      Pages 195-211
  7. Public Key Cryptanalysis II

    1. Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer et al.
      Pages 226-246
  8. Universal Composability

    1. Ran Canetti, Tal Rabin
      Pages 265-281
  9. Zero-Knowledge

    1. Boaz Barak, Shien Jin Ong, Salil Vadhan
      Pages 299-315

About these proceedings


Crypto 2003, the 23rd Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The conference received 169 submissions, of which the program committee selected 34 for presentation. These proceedings contain the revised versions of the 34 submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. Submissions to the conference represent cutti- edge research in the cryptographic community worldwide and cover all areas of cryptography. Many high-quality works could not be accepted. These works will surely be published elsewhere. The conference program included two invited lectures. Moni Naor spoke on cryptographic assumptions and challenges. Hugo Krawczyk spoke on the ‘SI- and-MAc’approachtoauthenticatedDi?e-HellmananditsuseintheIKEpro- cols. The conference program also included the traditional rump session, chaired by Stuart Haber, featuring short, informal talks on late-breaking research news. Assembling the conference program requires the help of many many people. To all those who pitched in, I am forever in your debt. I would like to ?rst thank the many researchers from all over the world who submitted their work to this conference. Without them, Crypto could not exist. I thank Greg Rose, the general chair, for shielding me from innumerable logistical headaches, and showing great generosity in supporting my e?orts.


Message Authentication Code Padding Signcryption Zero Knowledge algebraic geometry authentication authenticity computational number theory cryptographic protocols cryptography cryptology information security multiparty computation public key cryptography symmetric cryptography

Editors and affiliations

  • Dan Boneh
    • 1
  1. 1.Computer Science Dept.Stanford University 

Bibliographic information