Abstract is missing.
- Generating RSA Moduli with a Predetermined PortionArjen K. Lenstra. 1-10 [doi]
- Generation of Shared RSA Keys by Two PartiesGuillaume Poupard, Jacques Stern. 11-24 [doi]
- An Attack on RSA Given a Small Fraction of the Private Key BitsDan Boneh, Glenn Durfee, Yair Frankel. 25-34 [doi]
- ::::C:::::::*:::::-+:: and HM: Variations Around Two Schemes of T. Matsumoto and H. ImaiJacques Patarin, Louis Goubin, Nicolas Courtois. 35-49 [doi]
- ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract)Burton S. Kaliski Jr.. 50 [doi]
- Efficient Elliptic Curve Exponentiation Using Mixed CoordinatesHenri Cohen, Atsuko Miyaji, Takatoshi Ono. 51-65 [doi]
- Efficient Implementation of Schoof s AlgorithmTetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama. 66-79 [doi]
- Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F::2::nYasuyuki Sakai, Kouichi Sakurai. 80-94 [doi]
- Construction of Secure Elliptic Cryptosystems Using CM Tests and LiftingsJinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii. 95-109 [doi]
- Elliptic Curve Discrete Logarithms and the Index CalculusJoseph H. Silverman, Joe Suzuki. 110-125 [doi]
- Cryptanalysis of Rijmen-Preneel Trapdoor CiphersHongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye. 126-132 [doi]
- Improved Truncated Differential Attacks on SAFERHongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye. 133-147 [doi]
- Optimal Resistance Against the Davies and Murphy AttackThomas Pornin. 148-159 [doi]
- A Group Signature Scheme with Improved EfficiencyJan Camenisch, Markus Michels. 160-174 [doi]
- A Study on the Proposed Korean Digital Signature AlgorithmChae Hoon Lim, Pil Joong Lee. 175-186 [doi]
- Cryptoanalysis of the Original McEliece CryptosystemAnne Canteaut, Nicolas Sendrier. 187-199 [doi]
- Improving the Security of the McEliece Public-Key CryptosystemHung-Min Sun. 200-213 [doi]
- Cryptoanalysis in Prime Order Subgroups of ::::Z:::::::*:::::n::Wenbo Mao, Chae Hoon Lim. 214-226 [doi]
- Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKCZong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam. 227-241 [doi]
- Bounds and Constructions for Multireceiver Authentication CodesReihaneh Safavi-Naini, Huaxiong Wang. 242-256 [doi]
- Fair Off-Line e-cash Made EasyYair Frankel, Yiannis Tsiounis, Moti Yung. 257-270 [doi]
- Off-Line Fair Payment Protocols Using Convertible SignaturesColin Boyd, Ernest Foo. 271-285 [doi]
- Efficient Fair Exchange with Verifiable Confirmation of SignaturesLiqun Chen. 286-299 [doi]
- Adaptively Secure Oblivious TransferDonald Beaver. 300-314 [doi]
- ML-Sequences over Rings ::::Z/(2:::e:::):::::::*:::: I. Constructions of Nondegenerative ML-Sequences II. Injectiveness of Compression Mappings of New ClassesWen-Feng Qi, Jun-Hui Yang, Jing Jun Zhou. 315-326 [doi]
- Analysis Methods for (Alleged) RC4Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege. 327-341 [doi]
- Reduced Complexity Correlation Attacks on Two Clock-Controlled GeneratorsThomas Johansson. 342-356 [doi]
- A New Efficient All-Or-Nothing Disclosure of Secrets ProtocolJulien P. Stern. 357-371 [doi]
- The Béguin-Quisquater Server-Aided RSA Protocol from Crypto 95 is not SecurePhong Q. Nguyen, Jacques Stern. 372-379 [doi]
- Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)Mike Burmester, Yvo Desmedt, Jennifer Seberry. 380-391 [doi]
- Audio and Optical CryptographyYvo Desmedt, Shuang Hou, Jean-Jacques Quisquater. 392-404 [doi]
- Strong Security Against Active Attacks in Information-Theoretic Secret-Key AgreementStefan Wolf. 405-419 [doi]
- Some Bounds and a Construction for Secure Broadcast EncryptionKaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester. 420-433 [doi]