Abstract is missing.
- Cut-&-Paste Attacks with JAVASerge Lefranc, David Naccache. 1-15 [doi]
- Provably Secure Encrypt-then-Sign Composition in Hybrid SigncryptionIk Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong-Hoon Lee, Jong In Lim. 16-34 [doi]
- New DSA-Verifiable Signcryption SchemesJun-Bum Shin, Kwangsu Lee, Kyungah Shim. 35-47 [doi]
- Convertible Group Undeniable SignaturesYuh-Dauh Lyuu, Ming-Luen Wu. 48-61 [doi]
- An Efficient Fail-Stop Signature Scheme Based on FactorizationWilly Susilo, Reihaneh Safavi-Naini. 62-74 [doi]
- On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature SchemeGuilin Wang. 75-89 [doi]
- System Specification Based Network Modeling for Survivability Testing SimulationHyungjong Kim. 90-106 [doi]
- A Risk-Sensitive Intrusion Detection ModelHai Jin, Jianhua Sun, Hao Chen, Zongfen Han. 107-117 [doi]
- Applet Verification Strategiesfor RAM-Constrained DevicesNils Maltesson, David Naccache, Elena Trichina, Christophe Tymen. 118-137 [doi]
- Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide AttacksRaphael Chung-Wei Phan, Soichi Furuya. 138-148 [doi]
- Consistent Differential Patterns of RijndaelBeomsik Song, Jennifer Seberry. 149-163 [doi]
- Hardware Design and Analysisof Block Cipher ComponentsLu Xiao, Howard M. Heys. 164-181 [doi]
- Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of ToyocryptNicolas Courtois. 182-199 [doi]
- On the Efficiency of theClock Control Guessing AttackErik Zenner. 200-212 [doi]
- Balanced Shrinking GeneratorsSe Ah Choi, Kyeongcheol Yang. 213-225 [doi]
- On the Universal Hash Functionsin Luby-Rackoff CipherTetsu Iwata, Kaoru Kurosawa. 226-236 [doi]
- Threshold MACsKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild. 237-252 [doi]
- Ideal Threshold Schemes from MDS CodesJosef Pieprzyk, Xian-Mo Zhang. 253-263 [doi]
- New Frobenius Expansions for Elliptic Curves with Efficient EndomorphismsTae-Jun Park, Mun-Kyu Lee, Kunsoo Park. 264-282 [doi]
- Efficient Computations of the Tate Pairingfor the Large MOV DegreesTetsuya Izu, Tsuyoshi Takagi. 283-297 [doi]
- Improved Techniques for Fast ExponentiationBodo Möller. 298-312 [doi]
- Efficient Hardware Multiplicative InvertersHyun-Gyu Kim, Hyeong-Cheol Oh. 313-326 [doi]
- Ways to Enhance Differential Power AnalysisRégis Bevan, Erik Knudsen. 327-342 [doi]
- A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key ExpansionStefan Mangard. 343-358 [doi]
- A Reject Timing Attackon an IND-CCA2 Public-Key CryptosystemKouichi Sakurai, Tsuyoshi Takagi. 359-373 [doi]
- Hardware Fault Attackon RSA with CRT RevisitedSung-Ming Yen, Sang-Jae Moon, JaeCheol Ha. 374-388 [doi]
- Receipt-Free Electronic Voting Scheme with a Tamper-Resistant RandomizerByoungcheon Lee, Kwangjo Kim. 389-406 [doi]
- Non-interactive Auction Schemewith Strong PrivacyKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan. 407-420 [doi]
- An Anonymous Buyer-Seller Watermarking Protocol with Anonymity ControlHak Soo Ju, Hyun-Jeong Kim, Dong-Hoon Lee, Jong In Lim. 421-432 [doi]
- Speeding Up Secure Sessions Establishment on the InternetYaron Sella. 433-450 [doi]
- On Fairness in Exchange ProtocolsOlivier Markowitch, Dieter Gollmann, Steve Kremer. 451-464 [doi]
- A Model for Embedding and Authorizing Digital Signatures in Printed DocumentsJaeil Lee, Taekyoung Kwon, Sanghoon Song, JooSeok Song. 465-477 [doi]
- A Dynamic Group Key Distribution Scheme with Flexible User JoinHartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang. 478-496 [doi]
- Efficient Multicast Key Management for Stateless ReceiversJu Hee Ki, Hyun-Jeong Kim, Dong-Hoon Lee, Chang-Seop Park. 497-509 [doi]
- Fingerprint Verification System Involving Smart CardYoun-Hee Gil, Daesung Moon, Sung Bum Pan, Yongwha Chung. 510-524 [doi]
- A Fast Fingerprint Matching Algorithm Using Parzen Density EstimationChoonwoo Ryu, Hakil Kim. 525-533 [doi]