Abstract is missing.
- A New Distributed Primality Test for Shared RSA Keys Using Quadratic FieldsIngrid Biehl, Tsuyoshi Takagi. 1-16 [doi]
- Security Analysis and Improvement of the Global Key Recovery SystemYanjiang Yang, Feng Bao, Robert H. Deng. 17-24 [doi]
- The LILI-II Keystream GeneratorAndrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson. 25-39 [doi]
- A Secure Re-keying Scheme with Key Recovery PropertyHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang. 40-55 [doi]
- Modelling Trust Structures for Public Key InfrastructuresMarie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto. 56-70 [doi]
- Size of Broadcast in Threshold Schemes with DisenrollmentSusan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild. 71-88 [doi]
- Requirements for Group Independent Linear Threshold Secret Sharing SchemesBrian King. 89-106 [doi]
- Efficient Sharing of Encrypted DataKrista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu. 107-120 [doi]
- Cheating Prevention in Linear Secret SharingJosef Pieprzyk, Xian-Mo Zhang. 121-135 [doi]
- Note on Fast Computation of Secret RSA ExponentsWieland Fischer, Jean-Pierre Seifert. 136-143 [doi]
- Better than BiBa: Short One-Time Signatures with Fast Signing and VerifyingLeonid Reyzin, Natan Reyzin. 144-153 [doi]
- Cryptanalysis of Stream Cipher COS(2, 128) Mode IHongjun Wu, Feng Bao. 154-158 [doi]
- The Analysis of Zheng-Seberry SchemeDavid Soldera, Jennifer Seberry, Chengxin Qu. 159-168 [doi]
- Cryptanalysis of Stream Cipher Alpha1Hongjun Wu. 169-175 [doi]
- A Linear Algebraic Attack on the AAFG1 Braid Group CryptosystemJames Hughes. 176-189 [doi]
- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over F::q::YoungJu Choie, D. Yun. 190-202 [doi]
- Compact Representation of Domain Parameters of Hyperelliptic Curve CryptosystemsFangguo Zhang, Shengli Liu, Kwangjo Kim. 203-213 [doi]
- A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power AnalysisYvonne Hitchcock, Paul Montague. 214-225 [doi]
- Strengthening the Key Schedule of the AESLauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson. 226-240 [doi]
- On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption SchemesRon Steinfeld, Joonsang Baek, Yuliang Zheng. 241-256 [doi]
- Security Management: An Information Systems SettingMatthew J. Warren, Lynn Margaret Batten. 257-270 [doi]
- Resolving Conflicts in Authorization DelegationsChun Ruan, Vijay Varadharajan. 271-285 [doi]
- Policy Administration DomainsMichael Hitchens, Vijay Varadharajan, Gregory Saunders. 286-302 [doi]
- Maintaining the Validity of Digital Signatures in B2B ApplicationsJianying Zhou. 303-315 [doi]
- Short 3-Secure Fingerprinting Codes for Copyright ProtectionFrancesc Sebé, Josep Domingo-Ferrer. 316-327 [doi]
- An Order-Specified Multisignature Scheme Secure against Active Insider AttacksMitsuru Tada. 328-345 [doi]
- Authenticated Operation of Open Computing DevicesPaul England, Marcus Peinado. 346-361 [doi]
- A New Identification Scheme Based on the Bilinear Diffie-Hellman ProblemMyungsun Kim, Kwangjo Kim. 362-378 [doi]
- A Brief Outline of Research on Correlation Immune FunctionsBimal K. Roy. 379-394 [doi]
- m out of n Oblivious TransferYi Mu, Junqi Zhang, Vijay Varadharajan. 395-405 [doi]
- On the Security of Reduced Versions of 3-Pass HAVALSangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim. 406-419 [doi]
- On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and DoublingKatsuyuki Okeya, Kouichi Sakurai. 420-435 [doi]
- On the Security of a Modified Paillier Public-Key PrimitiveKouichi Sakurai, Tsuyoshi Takagi. 436-448 [doi]
- How to Play Sherlock Holmes in the World of Mobile AgentsBiljana Cubaleska, Weidong Qiu, Markus Schneider. 449-463 [doi]
- A Practical Approach Defeating BlackmailingDong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong-Hoon Lee, Hyungjin Yang. 464-481 [doi]
- Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor TracingHyun-Jeong Kim, Dong-Hoon Lee, Moti Yung. 482-496 [doi]
- Asynchronous Perfectly Secure Computation Tolerating Generalized AdversariesM. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan. 497-512 [doi]