Abstract is missing.
- Finding SHA-1 Characteristics: General Results and ApplicationsChristophe De Cannière, Christian Rechberger. 1-20 [doi]
- Improved Collision Search for SHA-0Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta. 21-36 [doi]
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash CollisionsScott Contini, Yiqun Lisa Yin. 37-53 [doi]
- New Guess-and-Determine Attack on the Self-Shrinking GeneratorBin Zhang, Dengguo Feng. 54-68 [doi]
- On the (In)security of Stream Ciphers Based on Arrays and Modular AdditionSouradyuti Paul, Bart Preneel. 69-83 [doi]
- Construction and Analysis of Boolean Functions of 2::::t::::+1 Variables with Maximum Algebraic ImmunityNa Li, Wen-Feng Qi. 84-98 [doi]
- Secure Sketch for Biometric TemplatesQiming Li, Yagiz Sutcu, Nasir D. Memon. 99-113 [doi]
- The 2-Adic CM Method for Genus 2 Curves with Application to CryptographyPierrick Gaudry, T. Houtmann, D. Kohel, Christophe Ritzenthaler, A. Weng. 114-129 [doi]
- Extending Scalar Multiplication Using Double BasesRoberto Maria Avanzi, Vassil S. Dimitrov, Christophe Doche, Francesco Sica. 130-144 [doi]
- HIBE With Short Public Parameters Without Random OracleSanjit Chatterjee, Palash Sarkar. 145-160 [doi]
- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private KeysNuttapong Attrapadung, Jun Furukawa, Hideki Imai. 161-177 [doi]
- On the Generic Construction of Identity-Based Signatures with Additional PropertiesDavid Galindo, Javier Herranz, Eike Kiltz. 178-193 [doi]
- On the Provable Security of an Efficient RSA-Based Pseudorandom GeneratorRon Steinfeld, Josef Pieprzyk, Huaxiong Wang. 194-209 [doi]
- On the Security of OAEPAlexandra Boldyreva, Marc Fischlin. 210-225 [doi]
- Relationship Between Standard Model Plaintext Awareness and Message HidingIsamu Teranishi, Wakaha Ogata. 226-240 [doi]
- On the Equivalence of RSA and Factoring Regarding Generic Ring AlgorithmsGregor Leander, Andy Rupp. 241-251 [doi]
- Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based EncryptionPascal Paillier, Jorge Luis Villar. 252-266 [doi]
- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA VariantsEllen Jochemsz, Alexander May. 267-282 [doi]
- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free PaddingDonghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung. 283-298 [doi]
- Multi-Property-Preserving Hash Domain Extension and the EMD TransformMihir Bellare, Thomas Ristenpart. 299-314 [doi]
- Combining Compression Functions and Block Cipher-Based Hash FunctionsThomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw. 315-331 [doi]
- A Scalable Password-Based Group Key Exchange Protocol in the Standard ModelMichel Abdalla, David Pointcheval. 332-347 [doi]
- A Weakness in Some Oblivious Transfer and Zero-Knowledge ProtocolsVentzislav Nikov, Svetla Nikova, Bart Preneel. 348-363 [doi]
- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret DistributionSatoshi Obana, Toshinori Araki. 364-379 [doi]
- KFC - The Krazy Feistel CipherThomas Baignères, Matthieu Finiasz. 380-395 [doi]
- Generic Attacks on Unbalanced Feistel Schemes with Contracting FunctionsJacques Patarin, Valérie Nachef, Côme Berbain. 396-411 [doi]
- New Cryptanalytic Results on IDEAEli Biham, Orr Dunkelman, Nathan Keller. 412-427 [doi]
- New Approach for Selectively Convertible Undeniable Signature SchemesKaoru Kurosawa, Tsuyoshi Takagi. 428-443 [doi]
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group SignaturesJens Groth. 444-459 [doi]
- Analysis of One Popular Group Signature SchemeZhengjun Cao. 460-466 [doi]