Abstract is missing.
- The Implementation of Elliptic Curve CryptosystemsAlfred Menezes, Scott A. Vanstone. 2-13
- Direct Demonstration of the Power to Break Public-Key CryptosystemsKenji Koyama. 14-21
- Continued Fractions and the Berlekamp-Massey AlgorithmZong-Duo Dai, Kencheng Zeng. 24-31
- Nonlinear Generators of Binary Sequences with Controllable Complexity and Double KeyGuang Gong. 32-36
- K-M Sequence is Forwardly PredictableYi Xian Yang. 37-38
- Lower Bounds on the Weight Complexities of Cascaded Binary SequencesCunsheng Ding. 39-43
- Secure User Access Control for Public NetworksPil Joong Lee. 46-57
- Formal Specification and Verification of Secure Communication ProtocolsSvein J. Knapskog. 58-73
- Network Security Policy ModelsVijay Varadharajan. 74-95
- KEYMEX: An expert system for the design of key management schemesJan C. A. van der Lubbe, Dick E. Boekee. 96-103
- On The Formal Analysis of PKCS Authentication ProtocolsKlaus Gaarder, Einar Snekkenes. 106-121
- Some Remarks on Authentication SystemsMartin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild. 122-139
- Meet-in-the-Middle Attack on Digital Signature SchemesKazuo Ohta, Kenji Koyama. 140-154
- A Binary Sequence Generator Based on Ziv-Lempel Source CodingCees J. A. Jansen, Dick E. Boekee. 156-164
- A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output SequenceMiodrag J. Mihaljevic, Jovan Dj. Golic. 165-175
- Parallel Generation of Pseudo-Random SequencesReihaneh Safavi-Naini. 176-193
- Large Primes in Stream Cipher CryptographyKencheng Zeng, Chung-Huang Yang, T. R. N. Rao. 194-205
- Comparison of Block CiphersHelen Gustafson, Ed Dawson, William J. Caelli. 208-220
- Key Scheduling In Des Type CryptosystemsLawrence Brown, Jennifer Seberry. 221-228
- LOKI - A Cryptographic Primitive for Authentication and Secrecy ApplicationsLawrence Brown, Josef Pieprzyk, Jennifer Seberry. 229-236
- Permutation Generators of Alternating GroupsJosef Pieprzyk, Xian-Mo Zhang. 237-244
- Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable PseudonymsDavid Chaum. 246-264
- A (non-practical) three-pass identification protocol using coding theoryMarc Girault. 265-272
- Demonstrating Possession without Revealing Factors and its ApplicationHiroki Shizuya, Kenji Koyama, Toshiya Itoh. 273-293
- Anonymous One-Time Signatures and Flexible Untraceable Electronic CashBarry Hayes. 294-305
- Dyadic Matrices and Their Potential Significance in CryptographyYi Xian Yang. 308-310
- A Note on Strong Fibonacci PseudoprimesRudolf Lidl, Winfried B. Müller. 311-317
- On the Significance of the Directed Acyclic Word Graph in CryptologyCees J. A. Jansen, Dick E. Boekee. 318-326
- Solving Equations in SequencesKencheng Zeng, Minqiang Huang. 327-332
- The Practical Application Of State Of The Art Security In Real EnvironmentsRonald Ferreira. 334-355
- RSA as a Benchmark for Multiprocessor MachinesRodney H. Cooper, Wayne Patterson. 356-359
- Range Equations and Range Matrices: a Study in Statistical Database SecurityVangalur S. Alagar. 360-385
- Record Encryption in Distributed DatabasesThomas Hardjono. 386-395
- VLSI Design for Exponentiation in GF (2:::n:::)Willi Geiselmann, Dieter Gollmann. 398-405
- A Fast Modular-multiplication Module for Smart CardsHikaru Morita. 406-409
- Minòs: Extended User AuthenticationMichael Newberry. 410-423
- Universal Logic SequencesEd Dawson, Bruce Goldburg. 426-432
- The Three Faces of Information SecurityJohn M. Carroll. 433-450
- Secure Cryptographic InitialisationMark Ames. 451-462