Abstract is missing.
- A Message Recovery Signature Scheme Equivalent to DSA over Elliptic CurvesAtsuko Miyaji. 1-14
- Cryptographic Protocols Based on Real-Quadratic A-fieldsIngrid Biehl, Bernd Meyer, Christoph Thiel. 15-25
- Minding your p s and q sRoss J. Anderson, Serge Vaudenay. 26-35
- Authenticated Multi-Party Key AgreementMike Just, Serge Vaudenay. 36-49
- Cryptography and the Internet: Lessons and ChallengesKevin S. McCurley. 50-56
- Generating Standard DSA Signatures Without Long InversionArjen K. Lenstra. 57-64
- A Fast Software Implementation for Arithmetic Operations in GF(2:::n:::)Erik De Win, Antoon Bosselaers, Servaas Vandenberghe, Peter De Gersem, Joos Vandewalle. 65-76
- Hash Functions Based on Block Ciphers and Quaternary CodesLars R. Knudsen, Bart Preneel. 77-90
- Generalized Feistel NetworksKaisa Nyberg. 91-104
- On Applying Linear Cryptanalysis to IDEAPhilip Hawkes, Luke O Connor. 105-115
- A Multi-Recastable Ticket Scheme for Electronic ElectionsChun-I Fan, Chin-Laung Lei. 116-124
- Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting SchemeMarkus Michels, Patrick Horster. 125-132
- Observations on Non-repudiationJianying Zhou, Dieter Gollmann. 133-144
- On the Efficiency of One-Time Digital SignaturesDaniel Bleichenbacher, Ueli M. Maurer. 145-158
- A Hidden Cryptographic Assunmption in No-Transferable Indentification SchemesKouichi Sakurai. 159-172
- Electronic Money and Key Management from Global and Regional Points of ViewShigeo Tsujii. 173-184
- Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human IdentificationKazukuni Kobara, Hideki Imai. 185-195
- Towards Characterizing When Information-Theoretic Secret Key Agreement Is PossibleUeli M. Maurer, Stefan Wolf. 196-209
- Key Sharing Based on the Wire-Tap Channel Type II Concept with Noisy Main ChannelValeri Korjik, D. Kushnir. 210-217
- Generalization of Higher Order SAC to Vector Output Boolean FunctionsKaoru Kurosawa, Takashi Satoh. 218-231
- On the Correlation Immune Functions and Their NonlinearitySeongtaek Chee, Sangjin Lee, Daiki Lee, Soo Hak Sung. 232-243
- How to Date Blind SignaturesMasayuki Abe, Eiichiro Fujisaki. 244-251
- Provably Secure Blind Signature SchemesDavid Pointcheval, Jacques Stern. 252-265
- Cost-Effective Payment Schemes with Privacy RegulationDavid M Raïhi. 266-275
- Mis-representation of Identities in E-cash Schemes and how to Prevent itAgnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis. 276-285
- Indirect Discourse Proof : Achieving Efficient Fair Off-Line E-cashYair Frankel, Yiannis Tsiounis, Moti Yung. 286-300
- The Validation of Cryptographic AlgorithmsJacques Stern. 301-310
- Convertible Group SignaturesSeungjoo Kim, Sungjun Park, Dongho Won. 311-321
- How to Utilize the Transformability of Digital Signatures for Solving the Oracle ProblemMasahiro Mambo, Kouichi Sakurai, Eiji Okamoto. 322-333
- On the Risk of Disruption in Several Multiparty Signature SchemesMarkus Michels, Patrick Horster. 334-345
- Correlation Attacks on Cascades of Clock Controlled Shift RegistersWilli Geiselmann, Dieter Gollmann. 346-359
- Conditional Correlation Attack on Nonlinear Filter GeneratorsSangjin Lee, Seongtaek Chee, Sangjoon Park, Sung-Mo Park. 360-367
- The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance CodesFlorent Chabaud, Jacques Stern. 368-381
- A World Wide Number Field Sieve Factoring Record: On to 512 BitsJames Cowie, Bruce Dodson, R. Marije Elkenbracht-Huizing, Arjen K. Lenstra, Peter L. Montgomery, Jörg Zayer. 382-394