Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Simon N. Foley. Using Trust Management to Support Transferable Hash-Based Micropayments. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 1-14. Springer, 2003. [  paper | publisher ]
[2] Markus Jakobsson and Jean-Pierre Hubaux and Levente Butty{\'a}n. A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 15-33. Springer, 2003. [  paper | publisher ]
[3] Matthieu Gaud and Jacques Traor{\'e}. On the Anonymity of Fair Offline E-cash Systems. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 34-50. Springer, 2003. [  paper | publisher ]
[4] Shouhuai Xu and Moti Yung. Retrofitting Fairness on the Original RSA-Based E-cash. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 51-68. Springer, 2003. [  paper | publisher ]
[5] Nicko van Someren and Andrew M. Odlyzko and Ronald L. Rivest and Tim Jones and Duncan Goldie-Scot. Does Anyone Really Need MicroPayments?. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 69-76. Springer, 2003. [  paper | publisher ]
[6] Andrew M. Odlyzko. The Case Against Micropayments. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 77-83. Springer, 2003. [  paper | publisher ]
[7] Alessandro Acquisti and Roger Dingledine and Paul F. Syverson. On the Economics of Anonymity. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 84-102. Springer, 2003. [  paper | publisher ]
[8] Ari Juels and Ravikanth Pappu. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 103-121. Springer, 2003. [  paper | publisher ]
[9] Stuart E. Schechter and Michael D. Smith. How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 122-137. Springer, 2003. [  paper | publisher ]
[10] Jacques Stern and Julien P. Stern. Cryptanalysis of the OTM Signature Scheme from FC'02. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 138-148. Springer, 2003. [  paper | publisher ]
[11] Dennis K{\"u}gler. "Man in the Middle" Attacks on Bluetooth. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 149-161. Springer, 2003. [  paper | publisher ]
[12] Johannes Bl{\"o}mer and Jean-Pierre Seifert. Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 162-181. Springer, 2003. [  paper | publisher ]
[13] Andrew M. Odlyzko. Economics, Psychology, and Sociology of Security. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 182-189. Springer, 2003. [  paper | publisher ]
[14] Juan A. Garay and Carl Pomerance. Timed Fair Exchange of Standard Signatures: [Extended Abstract]. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 190-207. Springer, 2003. [  paper | publisher ]
[15] Holger Vogt. Asynchronous Optimistic Fair Exchange Based on Revocable Items. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 208-222. Springer, 2003. [  paper | publisher ]
[16] Felix Brandt. Fully Private Auctions in a Constant Number of Rounds. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 223-238. Springer, 2003. [  paper | publisher ]
[17] Koutarou Suzuki and Makoto Yokoo. Secure Generalized Vickrey Auction Using Homomorphic Encryption. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 239-249. Springer, 2003. [  paper | publisher ]
[18] Moti Yung. Trusted Computing Platforms: The Good, the Bad, and the Ugly. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 250-254. Springer, 2003. [  paper | publisher ]
[19] Dirk Kuhlmann. On TCPA. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 255-269. Springer, 2003. [  paper | publisher ]
[20] Yaron Sella. On The Computation-Storage Trade-Offs of Hash Chain Traversal. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 270-285. Springer, 2003. [  paper | publisher ]
[21] Javier Herranz and Germ{\'a}n S{\'a}ez. Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 286-302. Springer, 2003. [  paper | publisher ]
[22] Aggelos Kiayias and Moti Yung. Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 303-320. Springer, 2003. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.