Abstract is missing.
- Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE)Praveen Gauravaram, William Millan. 1-13
- Perspectives on Word Based Stream CiphersKevin Chen, William Millan, Leonie Ruth Simpson. 14-27
- CRUSH: A New Cryptographic Hash Function using Iterated Halving TechniquePraveen Gauravaram, William Millan, Lauren May. 28-39
- An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof SystemLan Nguyen, Reihaneh Safavi-Naini. 40-56
- A Secure and Efficient Mix-Network using Extended Binary Mixing GateKun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee. 57-71
- A Modification to the Authentication of Concast Communication Hossein Ghodosi, Josef Pieprzyk. 72-77
- Efficient Public Key Generation for HFE and VariationsChristopher Wolf. 78-93
- Implementation of the GBD CryptosystemJaimee Brown, Ed Dawson, Juan Manuel González Nieto. 94-109
- An Implementation of the Yao Forward Integrity Protocol for Mobile AgentsMatthew Henricksen, Ming Yao, Ernest Foo. 110-124
- A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine NavigationChris Wullems, Harikrishna Vasanta, Mark Looi, Andrew Clark. 125-139
- Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)Mike Bond, Jolyon Clulow. 140-151
- Improvements to the RAK Factoring AlgorithmYousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock. 152