© 2002

Public Key Cryptography — PKC 2003

6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6–8, 2003 Proceedings

  • Yvo G. Desmedt
Conference proceedings PKC 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2567)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Diffie-Hellman Based Schemes

  3. Threshold Cryptography

  4. Reduction Proofs

    1. Mats Näslund, Igor E. Shparlinski, William Whyte
      Pages 62-70
  5. Broadcast and Tracing

    1. Mihir Bellare, Alexandra Boldyreva, Jessica Staddon
      Pages 85-99
  6. Digital Signatures

    1. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
      Pages 130-144
  7. Specialized Multiparty Cryptography

    1. Colin Boyd, Juan Manuel González Nieto
      Pages 161-174
  8. Cryptanalysis I

    1. Christian Tobias
      Pages 175-186
    2. Dennis Hofheinz, Rainer Steinwandt
      Pages 187-198
  9. Elliptic Curves:Implementation Attacks

    1. Adrian Antipa, Daniel Brown, Alfred Menezes, René Struik, Scott Vanstone
      Pages 211-223
    2. Tetsuya Izu, Tsuyoshi Takagi
      Pages 224-239
  10. Implementation and Hardware Issues

    1. Willi Geiselmann, Rainer Steinwandt
      Pages 254-266

About these proceedings


PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research ( This year the workshop was organized in cooperation with the Department of Computer Science, Florida State University. The General Chair, Mike Burmester was responsible for local organization, registration, etc. There were 105 submitted papers which were considered by the Program Committee. This is an increase of 52% compared to PKC 2002, which took place in Paris, France, February 2002, and which was incorrectly identi?ed on the cover of the proceedings as being the fourth workshop. Due to the large number of submissions, some papers that contained new ideas had to be rejected. Priority was given to novel papers. Of the 105 submissions, 26 were selected for the proceedings. These contain the revised versions of the accepted papers. Each paper was sent to at least 3 members of the program committee for comments. Revisions were not checked for correctness of their scienti?c aspects and the authors bear full responsibility for the contents of their papers. Some authors will write ?nal versions of their papers for publication in refereed journals. I am very grateful to the members of the Program Committee for their hard work in the di?cult task of selecting roughly 1 out of 4 of the submitted papers.


Assymetric Cryptography Cryptanalysis Elliptic Curve cryptography IT security Key Agreement Public Key Public Key Cryptosystems Public Key Infrastructure RSA Sflash Signatur Text cryptography identity security

Editors and affiliations

  • Yvo G. Desmedt
    • 1
  1. 1.Department of Computer ScienceFlorida State UniversityTallahasseeUSA

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking