Abstract is missing.
- On the properties of public key encryption from group signaturesGoichiro Hanaoka. 1-2 [doi]
- Leakage-resilient lossy trapdoor functions and public-key encryptionBaodong Qin, Shengli Liu, Kefei Chen, Manuel Charlemagne. 3-12 [doi]
- Leakage-resilient certificateless public key encryptionHao Xiong, Tsz Hon Yuen, Cong Zhang, Siu-Ming Yiu, Yi Jun He. 13-22 [doi]
- Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanismTakashi Yamakawa, Shota Yamada, Takahiro Matsuda 0002, Goichiro Hanaoka, Noboru Kunihiro. 23-32 [doi]
- Upper bound of the length of information embedd in RSA public key efficientlyMotoki Kitahara, Takanori Yasuda, Takashi Nishide, Kouichi Sakurai. 33-38 [doi]
- Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodesDalin Chu, Johann Großschädl, Zhe Liu, Volker Müller, Yang Zhang. 39-44 [doi]
- Secure group key management scheme based on dual receiver cryptosystemB. R. Purushothama, B. B. Amberker. 45-50 [doi]
- End-to-end aggregate authentication of time-series dataDi Ma, Yan Zhu, Mengyang Yu. 51-56 [doi]
- A variant of rainbow with shorter secret key and faster signature generationTakanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai. 57-62 [doi]