Abstract is missing.
- Treshold Cryptosystems (invited talk)Yvo Desmedt. 3-14
- Authentication Codes with Perfect ProtectionL. Tombak, Reihaneh Safavi-Naini. 15-26
- Practical Proven Secure Authentication with ArbitrationYvo Desmedt, Jennifer Seberry. 27-32
- Authentication Codes under Impersonation AttackReihaneh Safavi-Naini, L. Tombak. 35-47
- Cumulative Arrays and Geometric Secret Sharing SchemesWen-Ai Jackson, Keith M. Martin. 48-55
- Nonperfect Secret Sharing SchemesWakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii. 56-66
- A Construction of Practical Secret Sharing Schemes using Linear Block CodesMichael Bertilsson, Ingemar Ingemarsson. 67-79
- HAVAL - A One-Way Hashing Algorithm with Variable Length of OutputYuliang Zheng, Josef Pieprzyk, Jennifer Seberry. 83-104
- On the Power of Memory in the Design of Collision Resistant Hash FunctionsBart Preneel, René Govaerts, Joos Vandewalle. 105-121
- A Practical Digital Multisignature Scheme Based on Discrete LogarithmsThomas Hardjono, Yuliang Zheng. 122-132
- Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted PartyLein Harn, Shoubao Yang. 133-142
- Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche CriterionJennifer Seberry, Xian-Mo Zhang. 145-155
- Linear Nonequivalence versus NonlinearityChris Charnes, Josef Pieprzyk. 156-164
- Constructing Large Cryptographically Strong S-boxesJohn Detombe, Stafford E. Tavares. 165-181
- Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk)Valery I. Korzhik, Viktor Yakovlev. 185-195
- Cryptanalysis of LOKI91Lars R. Knudsen. 196-208
- Cryptanalysis of Summation GeneratorEd Dawson. 209-215
- Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation ProtocolsChi-Sung Laih, Sung-Ming Yen. 219-230
- Subliminal Channels for Signature Transfer and Their Application to Signature Distribution SchemesKouichi Sakurai, Toshiya Itoh. 231-243
- A Practical Secret Voting Scheme for Large Scale ElectionsAtsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta. 244-251
- Privacy for Multi-Party ProtocolsTakashi Satoh, Kaoru Kurosawa, Shigeo Tsujii. 252-260
- New Protocols for Electronic MoneyJean Claude Pailles. 263-274
- Modelling and Analyzing Cryprographic Protocols Using Petri NetsBenjamin B. Nieh, Stafford E. Tavares. 275-295
- On Verifiable Implicit Asking Protocols for RSA ComputationTsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen. 296-307
- Modified Maurer-Yacobi s scheme and its applicationsChae Hoon Lim, Pil Joong Lee. 308-323
- The Vulnerability of Geometric Sequences Based on Fields on Odd CharacteristicAndrew Klapper. 327-338
- A Fast Cryptographic Checksum Algorithm Based on Stream CiphersXuejia Lai, Rainer A. Rueppel, Jack Woollven. 339-348
- An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance MeasureMiodrag J. Mihaljevic. 349-356
- Construction of m-ary de Bruijn Sequences (Extendet abstract)Jun-Hui Yang, Zong-Duo Dai. 357-363
- Information Technology Security Standards - An Australian PerspectiveJohn Snare. 367-384
- Non-Interactive Generation of Shared Pseudorandom SequencesManuel Cerecedo, Tsutomu Matsumoto, Hideki Imai. 385-396
- A Generalized Description of DES-based and Benes-based PermutationgeneratorsMichael Portz. 397-409
- Prime Generation with the Demytko-Miller-Trbuvich AlgorithmLeisa Condie. 413-421
- Constructions of Freebly-One-Way Families of PermutationsAlain P. Hiltgen. 422-434
- On Bit Correlations Among Preimages of Many to One One-Way FunctionsKouichi Sakurai, Toshiya Itoh. 435-446
- The Fast Cascade Exponentation Algorithm and its Applications on CryptographySung-Ming Yen, Chi-Sung Laih. 447-456
- The Design of a Conference Key Distribution SystemChin-Chen Chang, Tzong-Chen Wu, C. P. Chen. 459-466
- Remarks on The Design of a Conference Key Distribution System Edward Zuk. 467-468
- Public-Key Cryptosystem Based on the Discrete Logarithm ProblemLein Harn, Shoubao Yang. 469-476
- Elliptic Curves over F::p:: Suitable for CryptosystemsAtsuko Miyaji. 479-491
- The Probability Distribution of the Diffie-Hellman KeyChristian Waldvogel, James L. Massey. 492-504
- A Modular Exponentiation Unit Based on Systolic ArraysJörg Sauerbrey. 505-516
- A Comparison of Key Distribution Patterns Constructed from Circle GeometriesChristine M. O Keefe. 517-527
- A Block Cipher Method using Combinations of Different Methods under the Control of the User KeyMike Rezny, Eddie Trimarchi. 531-534
- An Attack on Two Hash Functions by Zheng-Matsumoto-ImaiBart Preneel, René Govaerts, Joos Vandewalle. 535-538
- Primality Testing with Lucas FunctionsRudolf Lidl, Winfried B. Müller. 539-542