Abstract is missing.
- Total Break of the ::::l::::-IC Signature SchemePierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern. 1-17 [doi]
- Recovering NTRU Secret Key from Inversion OraclesPetros Mol, Moti Yung. 18-36 [doi]
- Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?Alexander May, Maike Ritzenhofen. 37-46 [doi]
- Relations Among Notions of Plaintext AwarenessJames Birkett, Alexander W. Dent. 47-64 [doi]
- Completely Non-malleable Encryption RevisitedCarmine Ventre, Ivan Visconti. 65-84 [doi]
- Cryptographic Test CorrectionÉric Levieil, David Naccache. 85-100 [doi]
- Off-Line/On-Line Signatures: Theoretical Aspects and Experimental ResultsDario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro. 101-120 [doi]
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesSiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini. 121-140 [doi]
- Proxy Signatures Secure Against Proxy Key ExposureJacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson. 141-161 [doi]
- Lattice-Based Identification Schemes Secure Under Active AttacksVadim Lyubashevsky. 162-179 [doi]
- Efficient Simultaneous BroadcastSebastian Faust, Emilia Käsper, Stefan Lucks. 180-196 [doi]
- SAS-Based Group Authentication and Key Agreement ProtocolsSven Laur, Sylvain Pasini. 197-213 [doi]
- An Optimized Hardware Architecture for the Montgomery Multiplication AlgorithmMiaoqing Huang, Kris Gaj, Soonhak Kwon, Tarek A. El-Ghazawi. 214-228 [doi]
- New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime FieldsPatrick Longa, Ali Miri. 229-247 [doi]
- Online-Untransferable SignaturesMoses Liskov, Silvio Micali. 248-267 [doi]
- Security of Digital Signature Schemes in Weakened Random Oracle ModelsAkira Numayama, Toshiyuki Isshiki, Keisuke Tanaka. 268-287 [doi]
- A Digital Signature Scheme Based on CVP::infinity::Thomas Plantard, Willy Susilo, Khin Than Win. 288-307 [doi]
- An Analysis of the Vector Decomposition ProblemSteven D. Galbraith, Eric R. Verheul. 308-327 [doi]
- A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product ExponentsSungwook Kim, Jung Hee Cheon. 328-343 [doi]
- Certificateless Encryption Schemes Strongly Secure in the Standard ModelAlexander W. Dent, Benoît Libert, Kenneth G. Paterson. 344-359 [doi]
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryptionBenoît Libert, Damien Vergnaud. 360-379 [doi]
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption TimeYi-Ru Liu, Wen-Guey Tzeng. 380-396 [doi]