Abstract is missing.
- Cryptanalytic Time/Memory/Data Tradeoffs for Stream CiphersAlex Biryukov, Adi Shamir. 1-13 [doi]
- Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt 99Glenn Durfee, Phong Q. Nguyen. 14-29 [doi]
- Why Textbook ElGamal and RSA Encryption Are InsecureDan Boneh, Antoine Joux, Phong Q. Nguyen. 30-43 [doi]
- Cryptanalysis of the TTM CryptosystemLouis Goubin, Nicolas Courtois. 44-57 [doi]
- Attacking and Repairing Batch Verification SchemesColin Boyd, Chris Pavlovski. 58-71 [doi]
- Cryptography EverywhereThomas A. Berson. 72 [doi]
- Security of Signed ElGamal EncryptionClaus-Peter Schnorr, Markus Jakobsson. 73-89 [doi]
- From Fixed-Length to Arbitrary-Length RSA Padding SchemesJean-Sébastien Coron, François Koeune, David Naccache. 90-96 [doi]
- Towards Signature-Only Signature SchemesAdam Young, Moti Yung. 97-115 [doi]
- A New Forward-Secure Digital Signature SchemeMichel Abdalla, Leonid Reyzin. 116-129 [doi]
- Unconditionally Secure Digital Signature Schemes Admitting TransferabilityGoichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai. 130-142 [doi]
- Efficient Secure Multi-party ComputationMartin Hirt, Ueli M. Maurer, Bartosz Przydatek. 143-161 [doi]
- Mix and Match: Secure Function Evaluation via CiphertextsMarkus Jakobsson, Ari Juels. 162-177 [doi]
- A Length-Invariant Hybrid MixMiyako Ohkubo, Masayuki Abe. 178-191 [doi]
- Attack for Flash MIXMasashi Mitomo, Kaoru Kurosawa. 192-204 [doi]
- Distributed Oblivious TransferMoni Naor, Benny Pinkas. 205-219 [doi]
- Key Improvements to XTRArjen K. Lenstra, Eric R. Verheul. 220-233 [doi]
- Security of Cryptosystems Based on Class Groups of Imaginary Quadratic OrdersSafuat Hamdy, Bodo Möller. 234-247 [doi]
- Weil Descent of Elliptic Curves over Finite Fields of Characteristic ThreeSeigo Arita. 248-258 [doi]
- Construction of Hyperelliptic Curves with CM and Its Application to CryptosystemsJinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shigeo Tsujii. 259-273 [doi]
- Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear CryptanalysisJaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park. 274-288 [doi]
- On the Pseudorandomness of Top-Level Schemes of Block CiphersShiho Moriai, Serge Vaudenay. 289-302 [doi]
- Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream CiphersPhilip Hawkes, Gregory G. Rose. 303-316 [doi]
- Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient CryptographyMihir Bellare, Phillip Rogaway. 317-330 [doi]
- Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing SchemesJan Camenisch, Ivan Damgård. 331-345 [doi]
- Addition of ElGamal PlaintextsMarkus Jakobsson, Ari Juels. 346-358 [doi]
- Improved Methods to Perform Threshold RSABrian King. 359-372 [doi]
- Commital Deniable Proofs and Electronic Campaign FinanceMatthew K. Franklin, Tomas Sander. 373-387 [doi]
- Provably Secure Metering SchemeWakaha Ogata, Kaoru Kurosawa. 388-398 [doi]
- CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic GovernmentHideki Imai, Atsuhiro Yamagishi. 399-400 [doi]
- Anonymous Fingerprinting with Direct Non-repudiationBirgit Pfitzmann, Ahmad-Reza Sadeghi. 401-414 [doi]
- Efficient Anonymous Fingerprinting with Group SignaturesJan Camenisch. 415-428 [doi]
- Increasing the Power of the Dealer in Non-interactive Zero-Knowledge Proof SystemsDanny Gutfreund, Michael Ben-Or. 429-442 [doi]
- Zero-Knowledge and Code ObfuscationSatoshi Hada. 443-457 [doi]
- A Note on Security Proofs in the Generic ModelMarc Fischlin. 458-469 [doi]
- On Relationships among Avalanche, Nonlinearity, and Correlation ImmunityYuliang Zheng, Xian-Mo Zhang. 470-482 [doi]
- Cryptanalysis of the Yi-Lam HashDavid Wagner. 483-488 [doi]
- Power Analysis, What Is Now Possible...Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, Didier Moyart. 489-502 [doi]
- Concrete Security Characterizations of PRFs and PRPs: Reductions and ApplicationsAnand Desai, Sara K. Miner. 503-516 [doi]
- The Security of Chaffing and WinnowingMihir Bellare, Alexandra Boldyreva. 517-530 [doi]
- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition ParadigmMihir Bellare, Chanathip Namprempre. 531-545 [doi]
- Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying TechniquesMichel Abdalla, Mihir Bellare. 546-559 [doi]
- Proofs of Security for the Unix Password Hashing AlgorithmDavid Wagner, Ian Goldberg. 560-572 [doi]
- Trapdooring Discrete Logarithms on Elliptic Curves over RingsPascal Paillier. 573-584 [doi]
- Strengthening McEliece CryptosystemPierre Loidreau. 585-598 [doi]
- Password-Authenticated Key Exchange Based on RSAPhilip D. MacKenzie, Sarvar Patel, Ram Swaminathan. 599-613 [doi]
- Round-Efficient Conference Key Agreement Protocols with Provable SecurityWen-Guey Tzeng, Zhi-Jia Tzeng. 614-628 [doi]