Abstract is missing.
- Cryptanalysis of the SFLASH Signature SchemeVivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern. 1-4 [doi]
- On the Evolution of User Authentication: Non-bilateral FactorsMoti Yung. 5-10 [doi]
- ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted MessageRaylin Tso, Takeshi Okamoto, Eiji Okamoto. 11-24 [doi]
- Provably Secure Identity-Based Undeniable Signatures with Selective and Universal ConvertibilityWei Wu, Yi Mu, Willy Susilo, Xinyi Huang. 25-39 [doi]
- An Efficient ID-Based Proxy Signature Scheme from PairingsChunxiang Gu, Yuefei Zhu. 40-50 [doi]
- Improved and Multiple Linear Cryptanalysis of Reduced Round SerpentBaudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater. 51-65 [doi]
- Linear Slide Attacks on the KeeLoq Block CipherAndrey Bogdanov. 66-80 [doi]
- A Key Predistribution Scheme Based on 3-DesignsJunwu Dong, Dingyi Pei, Xueli Wang. 81-92 [doi]
- Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA SettingWeijia Wang, Lei Hu, Yong Li 0002. 93-107 [doi]
- A Provably Secure One-Pass Two-Party Key Establishment ProtocolKonstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, A. Alexiadis. 108-122 [doi]
- Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard AssumptionYi Deng, Dongdai Lin. 123-137 [doi]
- Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious AdversariesMarc Mouffron, Frederic Rousseau, Huafei Zhu. 138-152 [doi]
- A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge ExtractorNing Ding, Dawu Gu. 153-166 [doi]
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access StructuresChristophe Tartary, Josef Pieprzyk, Huaxiong Wang. 167-181 [doi]
- Key Management Based on Hierarchical Secret Sharing in Ad-Hoc NetworksChuangui Ma, Rui Cheng. 182-191 [doi]
- Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale ImagesDaoshun Wang, Xiaobo Li, Feng Yi. 192-200 [doi]
- Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic AttacksSultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert. 201-215 [doi]
- Four Families of Binary Sequences with Low Correlation and Large Linear ComplexityJin-Song Wang, Wen-Feng Qi. 216-230 [doi]
- Pseudo-Randomness of Discrete-Log Sequences from Elliptic CurvesZhixiong Chen, Ning Zhang, Guozhen Xiao. 231-245 [doi]
- Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter GeneratorsNicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis. 246-255 [doi]
- Linear Equation on Polynomial Single Cycle T-FunctionsJin-Song Wang, Wen-Feng Qi. 256-270 [doi]
- Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of VariablesLongjiang Qu, Chao Li. 271-282 [doi]
- Anonymity and k-Choice IdentitiesJacek Cichon, Miroslaw Kutylowski. 283-297 [doi]
- Deniable Authentication on the InternetShaoquan Jiang. 298-312 [doi]
- Orthogonality between Key Privacy and Data Privacy, RevisitedRui Zhang 0002, Goichiro Hanaoka, Hideki Imai. 313-327 [doi]
- Unlinkable Randomizable Signature and Its Application in Group SignatureSujing Zhou, Dongdai Lin. 328-342 [doi]
- An Improved Collision Attack on MD5 AlgorithmShiwei Chen, Chenhui Jin. 343-357 [doi]
- Multivariates Polynomials for HashingJintai Ding, Bo-Yin Yang. 358-371 [doi]
- Efficient Public Key Encryption with Keyword Search Schemes from PairingsChunxiang Gu, Yuefei Zhu, Heng Pan. 372-383 [doi]
- Multi-Identity Single-Key Decryption without Random OraclesFuchun Guo, Yi Mu, Zhide Chen, Li Xu. 384-398 [doi]
- Kipnis-Shamir Attack on HFE RevisitedXin Jiang, Jintai Ding, Lei Hu. 399-411 [doi]
- Cryptanalysis of General Lu-Lee Type SystemsHaijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai. 412-426 [doi]
- A Timing-Resistant Elliptic Curve Backdoor in RSAAdam L. Young, Moti Yung. 427-441 [doi]
- A Watermarking Scheme in the Encrypted Domain for Watermarking ProtocolBin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang, Zan Li, Kai Fan. 442-456 [doi]
- Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access ControlChin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin. 457-462 [doi]
- Building Trusted Sub-domain for the Grid with Trusted ComputingJing Zhan, Huanguo Zhang, Fei Yan. 463-471 [doi]
- Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRMYongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau. 472-481 [doi]
- Online Tracing Scanning Worm with Sliding WindowYang Xiang, Qiang Li. 482-496 [doi]
- A New Proactive Defense Model Based on Intrusion Deception and TracebackJunfeng Tian, Ning Li. 497-506 [doi]
- On Modeling Post Decryption Error Processes in UMTS Air InterfaceFouz Sattar, Muid Mufti. 507-516 [doi]
- A Simple, Smart and Extensible Framework for Network Security MeasurementFeng Cheng 0002, Christian Wolter, Christoph Meinel. 517-531 [doi]