Abstract is missing.
- Chosen-Ciphertext Secure Proxy Re-encryption without PairingsRobert H. Deng, Jian Weng, Shengli Liu, Kefei Chen. 1-17 [doi]
- Hybrid Damgård Is CCA1-Secure under the DDH AssumptionYvo Desmedt, Helger Lipmaa, Duong Hieu Phan. 18-30 [doi]
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast EncryptionMasafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda. 31-48 [doi]
- Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant BitsHung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang. 49-63 [doi]
- Efficient and Short Certificateless SignatureRaylin Tso, Xun Yi, Xinyi Huang. 64-79 [doi]
- Sanitizable Signatures RevisitedTsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu. 80-97 [doi]
- An Efficient On-Line/Off-Line Signature Scheme without Random OraclesMarc Joye. 98-107 [doi]
- On the Security of Online/Offline Signatures and Multisignatures from ACISP 06Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. 108-119 [doi]
- A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor NetworksDavid Galindo, Rodrigo Roman, Javier Lopez. 120-132 [doi]
- Anonymous and Transparent Gateway-Based Password-Authenticated Key ExchangeMichel Abdalla, Malika Izabachène, David Pointcheval. 133-148 [doi]
- Cryptanalysis of EC-RAC, a RFID Identification ProtocolJulien Bringer, Hervé Chabanne, Thomas Icart. 149-161 [doi]
- Counting Method for Multi-party Computation over Non-abelian GroupsYouming Qiao, Christophe Tartary. 162-177 [doi]
- Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic GroupsPeishun Wang, Huaxiong Wang, Josef Pieprzyk. 178-195 [doi]
- Analysis and Design of Multiple Threshold Changeable Secret Sharing SchemesTiancheng Lou, Christophe Tartary. 196-213 [doi]
- Black-Box Constructions for Fully-Simulatable Oblivious Transfer ProtocolsHuafei Zhu. 214-225 [doi]
- Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based CryptographyYumi Sakemi, Yasuyuki Nogami, Katsuyuki Okeya, Hidehiro Katou, Yoshitaka Morikawa. 226-239 [doi]
- Cryptanalysis of MV3 Stream CipherMohammad Ali Orumiehchi, S. Fahimeh Mohebbipoor, Hossein Ghodosi. 240-251 [doi]
- 3D: A Three-Dimensional Block CipherJorge Nakahara Jr.. 252-267 [doi]
- Construction of Resilient Functions with Multiple Cryptographic CriteriaChao Li, Shaojing Fu, Bing Sun. 268-277 [doi]
- Enumeration of Homogeneous Rotation Symmetric Functions over FpShaojing Fu, Chao Li, Bing Sun. 278-284 [doi]
- Unconditionally Reliable Message Transmission in Directed HypergraphsKannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan. 285-303 [doi]
- An Open Framework for Remote Electronic ElectionsYu Zhang. 304-316 [doi]
- Conditional Payments for Computing MarketsBogdan Carbunar, Mahesh V. Tripunitara. 317-331 [doi]
- High-Speed Search System for PGP PassphrasesKoichi Shimizu, Daisuke Suzuki, Toyohiro Tsurumaru. 332-348 [doi]
- Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel AttacksManuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger. 349-365 [doi]
- Authenticated Directed DiffusionEric K. Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu. 366-377 [doi]
- A New Message Recognition Protocol for Ad Hoc Pervasive NetworksAtefeh Mashatan, Douglas R. Stinson. 378-394 [doi]