7 | -- | 9 | Thomas Beth, Whitfield Diffie. Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue |
9 | -- | 12 | Whitfield Diffie. The National Security Establishment and the Development of Public-Key Cryptography |
13 | -- | 15 | Mary Fischer. And Now For Something Completely Different (The Egyptologist and the Cryptographer: A Personal Reminiscence) |
17 | -- | 25 | Thomas Beth. Watching the Bhang Meter and Flying through Dirt |
27 | -- | 59 | Paul F. Syverson, Catherine Meadows. A Formal Language for Cryptographic Protocol Requirements |
61 | -- | 81 | Kaisa Nyberg, Rainer A. Rueppel. Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem |
83 | -- | 99 | Reihaneh Safavi-Naini, L. Tombak. Authentication Codes in Plaintext and Chosen-Content Attacks |
101 | -- | 110 | Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild. Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes |
111 | -- | 134 | Xian-Mo Zhang, Yuliang Zheng. Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors |
135 | -- | 151 | Dieter Gollmann, Yongfei Han, Chris J. Mitchell. Redundant Integer Representations and Fast Exponentiation |
153 | -- | 174 | Renate Scheidler, Andreas Stein, Hugh C. Williams. Key-Exchange in Real Quadratic Congruence Function Fields |