Abstract is missing.
- Generic Transformation to Strongly Unforgeable SignaturesQiong Huang, Duncan S. Wong, Yiming Zhao. 1-17 [doi]
- Efficient Generic On-Line/Off-Line Signatures Without Key ExposureXiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu. 18-30 [doi]
- Merkle Signatures with Virtually Unlimited Signature CapacityJohannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume. 31-45 [doi]
- Midpoints Versus Endpoints: From Protocols to FirewallsDiana von Bidder, David A. Basin, Germano Caronni. 46-64 [doi]
- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking SchemeLiang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo. 65-86 [doi]
- Analyzing an Electronic Cash Protocol Using Applied Pi CalculusZhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng. 87-103 [doi]
- Cryptanalysis of the TRMC-4 Public Key CryptosystemXuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner. 104-115 [doi]
- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener AttackHung-Min Sun, Mu-En Wu, Yao-Hsin Chen. 116-128 [doi]
- A Timing Attack on Blakley s Modular Multiplication Algorithm, and Applications to DSABahador Bakhshi, Babak Sadeghiyan. 129-140 [doi]
- Protecting AES Software Implementations on 32-Bit Processors Against Power AnalysisStefan Tillich, Christoph Herbst, Stefan Mangard. 141-157 [doi]
- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation ComplexityJunghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won. 158-176 [doi]
- Preventing Collusion Attacks on the One-Way Function Tree (OFT) SchemeXuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu. 177-193 [doi]
- Bayesian Methods for Practical Traitor TracingPhilip Zigoris, Hongxia Jin. 194-206 [doi]
- A New Protocol for Conditional Disclosure of Secrets and Its ApplicationsSven Laur, Helger Lipmaa. 207-225 [doi]
- An Unconditionally Secure Protocol for Multi-Party Set IntersectionRonghua Li, Chuankun Wu. 226-236 [doi]
- Privacy-Preserving Set UnionKeith B. Frikken. 237-252 [doi]
- Universal Accumulators with Efficient Nonmembership ProofsJiangtao Li, Ninghui Li, Rui Xue. 253-269 [doi]
- Unlinkable Secret Handshakes and Key-Private Group Key Management SchemesStanislaw Jarecki, Xiaomin Liu. 270-287 [doi]
- Identity-Based Proxy Re-encryptionMatthew Green, Giuseppe Ateniese. 288-306 [doi]
- A More Natural Way to Construct Identity-Based Identification SchemesGuomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang. 307-322 [doi]
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash FunctionsRui Zhang 0002. 323-339 [doi]
- Certified E-Mail Protocol in the ID-Based SettingChunxiang Gu, Yuefei Zhu, Yonghui Zheng. 340-353 [doi]
- Efficient Content Authentication in Peer-to-Peer NetworksRoberto Tamassia, Nikos Triandopoulos. 354-372 [doi]
- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc NetworksFagen Li, Yupu Hu, Chuanrong Zhang. 373-384 [doi]
- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key ChainsRatna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay. 385-400 [doi]
- BAP: Broadcast Authentication Using Cryptographic PuzzlesPatrick Schaller, Srdjan Capkun, David A. Basin. 401-419 [doi]
- Compressed XTRMasaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi. 420-431 [doi]
- Sliding Window Method for NTRUMun-Kyu Lee, Jung-Woo Kim, Jeong Eun Song, Kunsoo Park. 432-442 [doi]
- Efficient Certificateless Signature SchemesKyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong-Hoon Lee. 443-458 [doi]
- Security Mediated Certificateless SignaturesWun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi. 459-477 [doi]
- Gradually Convertible Undeniable SignaturesLaila El Aimani, Damien Vergnaud. 478-496 [doi]