Advertisement

Advances in Cryptology — EUROCRYPT 2003

International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings

  • Eli Biham

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2656)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Cryptanalysis I

  3. Secure Multi-party Computation I

    1. Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger
      Pages 51-67
    2. Benny Pinkas
      Pages 87-105
  4. Invited Talk I

    1. Kris Gaj, Arkadiusz Orłowski
      Pages 106-122
  5. Zero-Knowledge Protocols

    1. Yunlei Zhao, Xiaotie Deng, C. H. Lee, Hong Zhu
      Pages 123-139
    2. Daniele Micciancio, Erez Petrank
      Pages 140-159
    3. Juan A. Garay, Philip MacKenzie, Ke Yang
      Pages 177-194
  6. Foundations and Complexity Theoretic Security

  7. Public Key Encryption

  8. New Primitives

    1. Luis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford
      Pages 294-311
    2. Yevgeniy Dodis, Jee Hea An
      Pages 312-329
  9. Cryptanalysis II

    1. Patrik Ekdahl, Willi Meier, Thomas Johansson
      Pages 330-344
    2. Nicolas T. Courtois, Willi Meier
      Pages 345-359
  10. Elliptic Curves Cryptography

    1. Florian Hess
      Pages 374-387
    2. Mathieu Ciet, Tanja Lange, Francesco Sica, Jean-Jacques Quisquater
      Pages 388-400
  11. Digital Signatures

    1. Eu-Jin Goh, Stanisław Jarecki
      Pages 401-415
    2. Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
      Pages 416-432
  12. Invited Talk II

    1. Jacques Stern
      Pages 449-461
  13. Cryptanalysis III

    1. Pierre-Alain Fouque, Guillaume Poupard
      Pages 462-476
    2. Eonkyung Lee, Je Hong Park
      Pages 477-490
  14. Key Exchange

    1. Mario Di Raimondo, Rosario Gennaro
      Pages 507-523
    2. Rosario Gennaro, Yehuda Lindell
      Pages 524-543
  15. Information Theoretic Cryptography

  16. Secure Multi-party Computation II

    1. Jonathan Katz, Rafail Ostrovsky, Adam Smith
      Pages 578-595
    2. Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz
      Pages 596-613
  17. Group Signatures

  18. Back Matter
    Pages 649-649

About these proceedings

Keywords

Elliptic Curve Cryptography communication complexity cryptography cryptology information security

Editors and affiliations

  • Eli Biham
    • 1
  1. 1.Computer Science DepartmentTechnion — Israel Institute of TechnologyHaifaIsrael

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-39200-9
  • Copyright Information International Association for Cryptologic Research 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-14039-9
  • Online ISBN 978-3-540-39200-2
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering