Abstract is missing.
- Cryptanalysis of the EMD Mode of OperationAntoine Joux. 1-16 [doi]
- On the Optimality of Linear, Differential, and Sequential DistinguishersPascal Junod. 17-32 [doi]
- A Toolbox for Cryptanalysis: Linear and Affine Equivalence AlgorithmsAlex Biryukov, Christophe De Cannière, An Braeken, Bart Preneel. 33-50 [doi]
- Two-Threshold Broadcast and Detectable Multi-party ComputationMatthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger. 51-67 [doi]
- On the Limitations of Universally Composable Two-Party Computation without Set-up AssumptionsRan Canetti, Eyal Kushilevitz, Yehuda Lindell. 68-86 [doi]
- Fair Secure Two-Party ComputationBenny Pinkas. 87-105 [doi]
- Facts and Myths of Enigma: Breaking StereotypesKris Gaj, Arkadiusz Orlowski. 106-122 [doi]
- Resettable Zero-Knowledge in the Weak Public-Key ModelYunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu. 123-139 [doi]
- Simulatable Commitments and Efficient Concurrent Zero-KnowledgeDaniele Micciancio, Erez Petrank. 140-159 [doi]
- Simulation in Quasi-Polynomial Time, and Its Application to Protocol CompositionRafael Pass. 160-176 [doi]
- Strengthening Zero-Knowledge Protocols Using SignaturesJuan A. Garay, Philip D. MacKenzie, Ke Yang. 177-194 [doi]
- Nearly One-Sided Tests and the Goldreich-Levin PredicateGustav Hast. 195-210 [doi]
- Efficient and Non-malleable Proofs of Plaintext Knowledge and ApplicationsJonathan Katz. 211-228 [doi]
- A Public Key Encryption Scheme Based on the Polynomial Reconstruction ProblemDaniel Augot, Matthieu Finiasz. 229-240 [doi]
- A Simpler Construction of CCA2-Secure Public-Key Encryption under General AssumptionsYehuda Lindell. 241-254 [doi]
- A Forward-Secure Public-Key Encryption SchemeRan Canetti, Shai Halevi, Jonathan Katz. 255-271 [doi]
- Certificate-Based Encryption and the Certificate Revocation ProblemCraig Gentry. 272-293 [doi]
- CAPTCHA: Using Hard AI Problems for SecurityLuis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford. 294-311 [doi]
- Concealment and Its Applications to Authenticated EncryptionYevgeniy Dodis, Jee Hea An. 312-329 [doi]
- Predicting the Shrinking Generator with Fixed ConnectionsPatrik Ekdahl, Willi Meier, Thomas Johansson. 330-344 [doi]
- Algebraic Attacks on Stream Ciphers with Linear FeedbackNicolas Courtois, Willi Meier. 345-359 [doi]
- Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic TimeReynald Lercier, David Lubicz. 360-373 [doi]
- The GHS Attack RevisitedFlorian Hess. 374-387 [doi]
- Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast EndomorphismsMathieu Ciet, Tanja Lange, Francesco Sica, Jean-Jacques Quisquater. 388-400 [doi]
- A Signature Scheme as Secure as the Diffie-Hellman ProblemEu-Jin Goh, Stanislaw Jarecki. 401-415 [doi]
- Aggregate and Verifiably Encrypted Signatures from Bilinear MapsDan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham. 416-432 [doi]
- Hypercubic Lattice Reduction and Analysis of GGH and NTRU SignaturesMichael Szydlo. 433-448 [doi]
- Why Provable Security Matters?Jacques Stern. 449-461 [doi]
- On the Security of RDSAPierre-Alain Fouque, Guillaume Poupard. 462-476 [doi]
- Cryptanalysis of the Public-Key Encryption Based on Braid GroupsEonkyung Lee, Je Hong Park. 477-490 [doi]
- A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and ApplicationsMihir Bellare, Tadayoshi Kohno. 491-506 [doi]
- Provably Secure Threshold Password-Authenticated Key ExchangeMario Di Raimondo, Rosario Gennaro. 507-523 [doi]
- A Framework for Password-Based Authenticated Key ExchangeRosario Gennaro, Yehuda Lindell. 524-543 [doi]
- The Security of Many-Round Luby-Rackoff Pseudo-Random PermutationsUeli M. Maurer, Krzysztof Pietrzak. 544-561 [doi]
- New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy ExtractionRenato Renner, Stefan Wolf. 562-577 [doi]
- Round Efficiency of Multi-party Computation with a Dishonest MajorityJonathan Katz, Rafail Ostrovsky, Adam Smith. 578-595 [doi]
- Efficient Multi-party Computation over RingsRonald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz. 596-613 [doi]
- Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General AssumptionsMihir Bellare, Daniele Micciancio, Bogdan Warinschi. 614-629 [doi]
- Extracting Group Signatures from Traitor Tracing SchemesAggelos Kiayias, Moti Yung. 630-648 [doi]