Abstract is missing.
- The First Experimental Cryptanalysis of the Data Encryption StandardMitsuru Matsui. 1-11 [doi]
- Linear Cryptanalysis of the Fast Data Encipherment AlgorithmKazuo Ohta, Kazumaro Aoki. 12-16 [doi]
- Differential-Linear CryptanalysisSusan K. Langford, Martin E. Hellman. 17-25 [doi]
- Linear Cryptanalysis Using Multiple ApproximationsBurton S. Kaliski Jr., Matthew J. B. Robshaw. 26-39 [doi]
- Hashing with SL_2Jean-Pierre Tillich, Gilles Zémor. 40-49 [doi]
- Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction AttacksJinhui Chao, Kazuo Tanada, Shigeo Tsujii. 50-55 [doi]
- Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic OrdersIngrid Biehl, Johannes Buchmann, Christoph Thiel. 56-60 [doi]
- Designated Confirmer Signatures and Public-Key Encryption are EquivalentTatsuaki Okamoto. 61-74 [doi]
- Directed Acyclic Graphs, One-way Functions and Digital SignaturesDaniel Bleichenbacher, Ueli M. Maurer. 75-82 [doi]
- An Identity-Based Signature Scheme with Bounded Life-SpanOlivier Delos, Jean-Jacques Quisquater. 83-94 [doi]
- More Flexible Exponentiation with PrecomputationChae Hoon Lim, Pil Joong Lee. 95-107 [doi]
- A Parallel Permutation Multiplier for a PGM Crypto-chipTamás Horváth, Spyros S. Magliveras, Tran van Trung. 108-113 [doi]
- Cryptographic Randomness from Air Turbulence in Disk DrivesDon Davis, Ross Ihaka, Philip Fenstermacher. 114-120 [doi]
- Cryptanalysis of the Gemmell and Naor Multiround Authentication ProtocolChristian Gehrmann. 121-128 [doi]
- LFSR-based Hashing and AuthenticationHugo Krawczyk. 129-139 [doi]
- New Bound on Authentication Code with ArbitrationKaoru Kurosawa. 140-149 [doi]
- Multi-Secret Sharing SchemesCarlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro. 150-163 [doi]
- Designing Identification Schemes with Keys of Short SizeJacques Stern. 164-173 [doi]
- Proofs of Partial Knowledge and Simplified Design of Witness Hiding ProtocolsRonald Cramer, Ivan Damgård, Berry Schoenmakers. 174-187 [doi]
- Language Dependent Secure Bit CommitmentToshiya Itoh, Yuji Ohta, Hiroki Shizuya. 188-201 [doi]
- On the Length of Cryptographic Hash-Values Used in Identification SchemesMarc Girault, Jacques Stern. 202-215 [doi]
- Incremental Cryptography: The Case of Hashing and SigningMihir Bellare, Oded Goldreich, Shafi Goldwasser. 216-233 [doi]
- An Efficient Existentially Unforgeable Signature Scheme and its ApplicationsCynthia Dwork, Moni Naor. 234-246 [doi]
- Bounds for Resilient Functions and Orthogonal ArraysJürgen Bierbrauer, K. Gopalakrishnan, Douglas R. Stinson. 247-256 [doi]
- Tracing TraitorsBenny Chor, Amos Fiat, Moni Naor. 257-270 [doi]
- Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete AlgorithmsUeli M. Maurer. 271-281 [doi]
- Fast Generation of Provable Primes Using Search in Arithmetic ProgressionsPreda Mihailescu. 282-293 [doi]
- Attack on the Cryptographic Scheme NIKS-TASDon Coppersmith. 294-307 [doi]
- On the Risk of Opening Distributed KeysMike Burmester. 308-317 [doi]
- Cryptanalysis of Cryptosystems Based on Remote Chaos ReplicationThomas Beth, Dejan E. Lazic, A. Mathias. 318-331 [doi]
- A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered SequencesJames L. Massey, Shirlei Serconek. 332-340 [doi]
- The Security of Cipher Block ChainingMihir Bellare, Joe Kilian, Phillip Rogaway. 341-358 [doi]
- A Chosen Plaintext Attack of the 16-round Khufu CryptosystemHenri Gilbert, Pascal Chauvaud. 359-368 [doi]
- Ciphertext Only Attack for One-way Function of the MAP Using One CiphertextYukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu. 369-382 [doi]
- Pitfalls in Designing Substitution Boxes (Extended Abstract)Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng. 383-396 [doi]
- A Randomnesss-Rounds Tradeoff in Private ComputationEyal Kushilevitz, Adi Rosén. 397-410 [doi]
- Secure Voting Using Partially Compatible HomomorphismsKazue Sako, Joe Kilian. 411-424 [doi]
- Maintaining Security in the Presence of Transient FaultsRan Canetti, Amir Herzberg. 425-438 [doi]