Abstract is missing.
- Authenticated encryption and steganography in unconditional security settingTsutomu Matsumoto, Junji Shikata. 1-6 [doi]
- Unconditionally secure signatures and its related schemesGoichiro Hanaoka. 7-12 [doi]
- How to attain the ordinary channel capacity securely in wiretap channelsDaisuke Kobayashi, Hirosuke Yamamoto, Tomohiro Ogawa. 13-18 [doi]
- Brief history of quantum cryptography: a personal perspectiveGilles Brassard. 19-23 [doi]
- Cryptography in the bounded quantum-storage modelIvan Bjerre Damgård, Serge Fehr, Louis Salvail, Christian Schaffner. 24-27 [doi]
- Bit commitment from weak non-localityStefan Wolf, Jürg Wullschleger. 28-30 [doi]
- Temporary assumptions - quantum and classicalJörn Müller-Quade. 31-33 [doi]
- Provably unbreakable hyper-encryption in the limited access modelMichael O. Rabin. 34-37 [doi]
- Unconditionally private and reliable communication in an untrusted networkYvo Desmedt. 38-41 [doi]
- Broadcast and secure computation under reduced setup assumptionsMatthias Fitzi. 42-47 [doi]
- Cryptography and decoding Reed-Solomon codes as a hard problemAggelos Kiayias, Moti Yung. 48 [doi]
- Fast correlation attacks against stream ciphers and related open problemsAnne Canteaut. 49-54 [doi]
- Some topics related to resilient functionsKaoru Kurosawa. 55-60 [doi]
- Dynamic access policies for unconditionally secure secret sharing schemesKeith M. Martin. 61-66 [doi]
- Coding theorems on the threshold scheme for a general sourceHiroki Koga. 67-72 [doi]
- Relationship of three cryptographic channels in the UC frameworkTatsuaki Okamoto. 73 [doi]
- On extractors, error-correction and hiding all partial informationYevgeniy Dodis. 74-79 [doi]
- Randomness in self-healing key distribution schemesCarlo Blundo. 80-84 [doi]
- Bounds on authentication systems in query modelReihaneh Safavi-Naini, Peter R. Wild. 85-91 [doi]