Abstract is missing.
- The Future of Cryptographic AlgorithmsBart Preneel. 1-2 [doi]
- Bit-Free Collision: Application to APOP AttackLei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta. 3-21 [doi]
- Impossible Boomerang Attack for Block Cipher StructuresJiali Choy, Huihui Yap. 22-37 [doi]
- Improved Distinguishing Attacks on HC-256Gautham Sekar, Bart Preneel. 38-52 [doi]
- A Generic Construction of Timed-Release Encryption with Pre-open CapabilityYasumasa Nakai, Takahiro Matsuda 0002, Wataru Kitada, Kanta Matsuura. 53-70 [doi]
- An Efficient Identity-Based Signcryption Scheme for Multiple ReceiversS. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Chandrasekaran Pandu Rangan. 71-88 [doi]
- Universal Designated Verifier Signatures with Threshold-SignersPairat Thorncharoensri, Willy Susilo, Yi Mu. 89-109 [doi]
- Reducing Complexity Assumptions for Oblivious TransferK. Y. Cheong, Takeshi Koshiba. 110-124 [doi]
- Tamper-Tolerant Software: Modeling and ImplementationMariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan. 125-139 [doi]
- An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security EvaluationKoji Nuida. 140-157 [doi]
- Efficient Intrusion Detection Based on Static Analysis and Stack WalksJingyu Hua, MingChu Li, Kouichi Sakurai, Yizhi Ren. 158-173 [doi]
- Strongly Secure Authenticated Key Exchange without NAXOS ApproachMinkyu Kim, Atsushi Fujioka, Berkant Ustaoglu. 174-191 [doi]
- ID-Based Group Password-Authenticated Key ExchangeXun Yi, Raylin Tso, Eiji Okamoto. 192-211 [doi]
- A Proposal of Efficient Remote Biometric Authentication ProtocolTaiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki. 212-227 [doi]