Abstract is missing.
- Chosen-Ciphertext Security without RedundancyDuong Hieu Phan, David Pointcheval. 1-18 [doi]
- Some RSA-Based Encryption Schemes with Tight Security ReductionKaoru Kurosawa, Tsuyoshi Takagi. 19-36 [doi]
- A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its ApplicationsEmmanuel Bresson, Dario Catalano, David Pointcheval. 37-54 [doi]
- Factoring Estimates for a 1024-Bit RSA ModulusArjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James Hughes, Paul C. Leyland. 55-74 [doi]
- Index Calculus Attack for Hyperelliptic Curves of Small GenusNicolas Thériault. 75-92 [doi]
- Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic CurvesPradeep Kumar Mishra, Palash Sarkar. 93-110 [doi]
- Tate Pairing Implementation for Hyperelliptic Curves y:::2::: = x:::p:::-x + dIwan M. Duursma, Hyang-Sook Lee. 111-123 [doi]
- The AGM-X::0::(N) Heegner Point Lifting Algorithm and Elliptic Curve Point CountingDavid R. Kohel. 124-136 [doi]
- Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key HierarchyMiodrag J. Mihaljevic. 137-154 [doi]
- Leakage-Resilient Authenticated Key Establishment ProtocolsSeongHan Shin, Kazukuni Kobara, Hideki Imai. 155-172 [doi]
- Untraceable Fair Network Payment Protocols with Off-Line TTPChih-Hung Wang. 173-187 [doi]
- Incremental Multiset Hash Functions and Their Application to Memory Integrity CheckingDwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh. 188-207 [doi]
- New Parallel Domain Extenders for UOWHFWonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi. 208-227 [doi]
- Cryptanalysis of 3-Pass HAVALBart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle. 228-245 [doi]
- Efficient Group Signatures without TrapdoorsGiuseppe Ateniese, Breno de Medeiros. 246-268 [doi]
- Accumulating Composites and Improved Group SigningGene Tsudik, Shouhuai Xu. 269-286 [doi]
- Almost Uniform Density of Power Residues and the Provable Security of ESIGNTatsuaki Okamoto, Jacques Stern. 287-301 [doi]
- Rotations and Translations of Number Field Sieve PolynomialsJason E. Gower. 302-310 [doi]
- On Class Group Computations Using the Number Field SieveMark L. Bauer, Safuat Hamdy. 311-325 [doi]
- The Secret and Beauty of Ancient Chinese PadlocksHong-Sen Yan, Hsing-Hui Huang. 326-330 [doi]
- A Traceable Block CipherOlivier Billet, Henri Gilbert. 331-346 [doi]
- A New Attack against KhazadFrédéric Muller. 347-358 [doi]
- An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext AttackChong Hee Kim, Yong Ho Hwang, Pil Joong Lee. 359-373 [doi]
- Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution SchemesNuttapong Attrapadung, Kazukuni Kobara, Hideki Imai. 374-391 [doi]
- Boneh et al. s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman AssumptionJean-Sébastien Coron, David Naccache. 392-397 [doi]
- On Diophantine Complexity and Statistical Zero-Knowledge ArgumentsHelger Lipmaa. 398-415 [doi]
- Verifiable Homomorphic Oblivious Transfer and Private Equality TestHelger Lipmaa. 416-433 [doi]
- Generalized Powering Functions and Their Application to Digital SignaturesHisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi. 434-451 [doi]
- Certificateless Public Key CryptographySattam S. Al-Riyami, Kenneth G. Paterson. 452-473 [doi]
- A Complete and Explicit Security Reduction Algorithm for RSA-Based CryptosystemsKaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi. 474-491 [doi]
- The Insecurity of Esign in Practical ImplementationsPierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard. 492-506 [doi]
- Efficient One-Time Proxy SignaturesHuaxiong Wang, Josef Pieprzyk. 507-522 [doi]
- Universal Designated-Verifier SignaturesRon Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk. 523-542 [doi]