Abstract is missing.
- New Attacks on RSA with Small Secret CRT-ExponentsDaniel Bleichenbacher, Alexander May. 1-13 [doi]
- An Attack on a Modified Niederreiter Encryption SchemeChristian Wieschebrink. 14-26 [doi]
- Cryptanalysis of an Efficient Proof of Knowledge of Discrete LogarithmSébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern. 27-43 [doi]
- Efficient Polynomial Operations in the Shared-Coefficients SettingPayman Mohassel, Matthew K. Franklin. 44-57 [doi]
- Generic On-Line/Off-Line Threshold SignaturesChris Crutchfield, David Molnar, David Turner, David Wagner. 58-74 [doi]
- Linear Integer Secret Sharing and Distributed ExponentiationIvan Damgård, Rune Thorbek. 75-90 [doi]
- Encoding-Free ElGamal Encryption Without Random OraclesBenoît Chevallier-Mames, Pascal Paillier, David Pointcheval. 91-104 [doi]
- Parallel Key-Insulated Public Key EncryptionGoichiro Hanaoka, Yumiko Hanaoka, Hideki Imai. 105-122 [doi]
- Provably Secure Steganography with Imperfect SamplingAnna Lysyanskaya, Mira Meyerovich. 123-139 [doi]
- Collision-Resistant No More: Hash-and-Sign Paradigm RevisitedIlya Mironov. 140-156 [doi]
- Higher Order Universal One-Way Hash Functions from the Subset Sum AssumptionRon Steinfeld, Josef Pieprzyk, Huaxiong Wang. 157-173 [doi]
- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field SieveAn Commeine, Igor Semaev. 174-190 [doi]
- Efficient Scalar Multiplication by Isogeny DecompositionsChristophe Doche, Thomas Icart, David R. Kohel. 191-206 [doi]
- Curve25519: New Diffie-Hellman Speed RecordsDaniel J. Bernstein. 207-228 [doi]
- Strongly Unforgeable Signatures Based on Computational Diffie-HellmanDan Boneh, Emily Shen, Brent Waters. 229-240 [doi]
- Generalization of the Selective-ID Security Model for HIBE ProtocolsSanjit Chatterjee, Palash Sarkar. 241-256 [doi]
- Identity-Based Aggregate SignaturesCraig Gentry, Zulfikar Ramzan. 257-273 [doi]
- On the Limitations of the Spread of an IBE-to-PKE TransformationEike Kiltz. 274-289 [doi]
- Inoculating Multivariate Schemes Against Differential AttacksJintai Ding, Jason E. Gower. 290-301 [doi]
- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic ProtocolAlexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov. 302-314 [doi]
- High-Order Attacks Against the Exponent Splitting ProtectionFrédéric Muller, Frédéric Valette. 315-329 [doi]
- New Online/Offline Signature Schemes Without Random OraclesKaoru Kurosawa, Katja Schmidt-Samoa. 330-346 [doi]
- Anonymous Signature SchemesGuomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang. 347-363 [doi]
- The Power of Identification SchemesKaoru Kurosawa, Swee-Huay Heng. 364-377 [doi]
- Security Analysis of KEA Authenticated Key Exchange ProtocolKristin Lauter, Anton Mityagin. 378-394 [doi]
- SAS-Based Authenticated Key AgreementSylvain Pasini, Serge Vaudenay. 395-409 [doi]
- The Twist-AUgmented Technique for Key ExchangeOlivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval. 410-426 [doi]
- Password-Based Group Key Exchange in a Constant Number of RoundsMichel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval. 427-442 [doi]
- Conditional Oblivious CastCheng-Kang Chu, Wen-Guey Tzeng. 443-457 [doi]
- Efficiency Tradeoffs for Malicious Two-Party ComputationPayman Mohassel, Matthew K. Franklin. 458-473 [doi]
- On Constructing Certificateless Cryptosystems from Identity Based EncryptionBenoît Libert, Jean-Jacques Quisquater. 474-490 [doi]
- Building Better Signcryption Schemes with Tag-KEMsTor E. Bjørstad, Alexander W. Dent. 491-507 [doi]
- Security-Mediated Certificateless CryptographySherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto. 508-524 [doi]
- ::::k::::-Times Anonymous Authentication with a Constant Proving CostIsamu Teranishi, Kazue Sako. 525-542 [doi]