Abstract is missing.
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple RoundsTaizo Shirai, Bart Preneel. 1-15 [doi]
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMACPhillip Rogaway. 16-31 [doi]
- Eliminating Random Permutation Oracles in the Even-Mansour CipherCraig Gentry, Zulfikar Ramzan. 32-47 [doi]
- Towards Plaintext-Aware Public-Key Encryption Without Random OraclesMihir Bellare, Adriana Palacio. 48-62 [doi]
- OAEP 3-Round: A Generic and Secure Asymmetric Encryption PaddingDuong Hieu Phan, David Pointcheval. 63-77 [doi]
- Stream Ciphers: Dead or Alive?Adi Shamir. 78 [doi]
- On the Generalized Linear Equivalence of Functions Over Finite FieldsLuca Breveglieri, Alessandra Cherubini, Marco Macchetti. 79-91 [doi]
- Sieving Using Bucket SortKazumaro Aoki, Hiroki Ueda. 92-102 [doi]
- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite GroupsEonkyung Lee. 103-118 [doi]
- Practical Two-Party Computation Based on the Conditional GateBerry Schoenmakers, Pim Tuyls. 119-136 [doi]
- Privacy in Non-private EnvironmentsMarkus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey. 137-151 [doi]
- Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)Bartosz Przydatek, Reto Strobl. 152-169 [doi]
- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing SchemesRon Steinfeld, Huaxiong Wang, Josef Pieprzyk. 170-186 [doi]
- Masking Based Domain Extenders for UOWHFs: Bounds and ConstructionsPalash Sarkar. 187-200 [doi]
- Higher Order Universal One-Way Hash FunctionsDeukjo Hong, Bart Preneel, Sangjin Lee. 201-213 [doi]
- The MD2 Hash Function Is Not One-WayFrédéric Muller. 214-229 [doi]
- New Approaches to Password Authenticated Key Exchange Based on RSAMuxiang Zhang. 230-244 [doi]
- Constant-Round Authenticated Group Key Exchange for Dynamic GroupsHyun-Jeong Kim, Su-Mi Lee, Dong-Hoon Lee. 245-259 [doi]
- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive PiratesTatsuyuki Matsushita, Hideki Imai. 260-275 [doi]
- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication DevicesRosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis. 276-292 [doi]
- Secret Handshakes from CA-Oblivious EncryptionClaude Castelluccia, Stanislaw Jarecki, Gene Tsudik. 293-307 [doi]
- k-Times Anonymous Authentication (Extended Abstract)Isamu Teranishi, Jun Furukawa, Kazue Sako. 308-322 [doi]
- The XL-Algorithm and a Conjecture from Commutative AlgebraClaus Diem. 323-337 [doi]
- Comparison Between XL and Gröbner Basis AlgorithmsGwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita. 338-353 [doi]
- Generic Homomorphic Undeniable SignaturesJean Monnerat, Serge Vaudenay. 354-371 [doi]
- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear PairingsLan Nguyen, Reihaneh Safavi-Naini. 372-386 [doi]
- On the Security of MOR Public Key CryptosystemIn-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek. 387-400 [doi]
- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter ChoiceAggelos Kiayias, Moti Yung. 401-416 [doi]
- Colluding Attacks to a Payment Protocol and Two Signature Exchange SchemesFeng Bao. 417-429 [doi]
- Information Security in Korea IT839 StrategyHo-Ick Suk. 430-431 [doi]
- How Far Can We Go Beyond Linear Cryptanalysis?Thomas Baignères, Pascal Junod, Serge Vaudenay. 432-450 [doi]
- The Davies-Murphy Power AttackSébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette. 451-467 [doi]
- Time-Memory Trade-Off Attacks on Multiplications and T-FunctionsJoydip Mitra, Palash Sarkar. 468-482 [doi]
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0Yi Lu 0002, Serge Vaudenay. 483-499 [doi]
- On Provably Secure Time-Stamping SchemesAhto Buldas, Märt Saarepera. 500-514 [doi]
- Strong Conditional Oblivious Transfer and Computing on IntervalsIan F. Blake, Vladimir Kolesnikov. 515-529 [doi]
- Improved Setup Assumptions for 3-Round Resettable Zero KnowledgeGiovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti. 530-544 [doi]