Abstract is missing.
- Keying Hash Functions for Message AuthenticationMihir Bellare, Ran Canetti, Hugo Krawczyk. 1-15 [doi]
- Universal Hashing and Multiple AuthenticationMustafa Atici, Douglas R. Stinson. 16-30 [doi]
- Universal Hash Functions from Exponential Sums over Finite Fields and Galois RingsTor Helleseth, Thomas Johansson. 31-44 [doi]
- Asymmetric Cryptography with a Hidden MonomialJacques Patarin. 45-60 [doi]
- Anonymous Communication and Anonymous CashDaniel R. Simon. 61-73 [doi]
- Weakness in Some Threshold CryptosystemsSusan K. Langford. 74-82 [doi]
- Hidden Collisions on DSSSerge Vaudenay. 83-88 [doi]
- The Dark Side of Black-Box Cryptography, or: Should We Trust Capstone?Adam Young, Moti Yung. 89-103 [doi]
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsPaul C. Kocher. 104-113 [doi]
- All Bits ax+b mod p are Hard (Extended Abstract)Mats Näslund. 114-128 [doi]
- Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related SchemesDan Boneh, Ramarathnam Venkatesan. 129-142 [doi]
- Security of 2^t-Root Identification and SignaturesClaus-Peter Schnorr. 143-156 [doi]
- Robust and Efficient Sharing of RSA FunctionsRosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin. 157-172 [doi]
- New Generation of Secure and Practical RSA-Based SignaturesRonald Cramer, Ivan Damgård. 173-185 [doi]
- Proving Without Knowing: On Oblivious, Agnostic and Blindolded ProversMarkus Jakobsson, Moti Yung. 186-200 [doi]
- Practical and Provably-Secure Commitment Schemes from Collision-Free HashingShai Halevi, Silvio Micali. 201-215 [doi]
- Improved Differential Attacks on RC5Lars R. Knudsen, Willi Meier. 216-228 [doi]
- Improving Implementable Meet-in-the-Middle Attacks by Orders of MagnitudePaul C. van Oorschot, Michael J. Wiener. 229-236 [doi]
- Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DESJohn Kelsey, Bruce Schneier, David Wagner. 237-251 [doi]
- How to Protect DES Against Exhaustive Key SearchJoe Kilian, Phillip Rogaway. 252-267 [doi]
- Diffie-Hellman OraclesUeli M. Maurer, Stefan Wolf. 268-282 [doi]
- Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract)Dan Boneh, Richard J. Lipton. 283-297 [doi]
- Fast Hashing on the PentiumAntoon Bosselaers, René Govaerts, Joos Vandewalle. 298-312 [doi]
- On Fast and Provably Secure Message Authentication Based on Universal HashingVictor Shoup. 313-328 [doi]
- Quantum Cryptography over Underground Optical FibersR. J. Hughes, G. G. Luther, G. L. Morgan, C. G. Peterson, C. M. Simmons. 329-342 [doi]
- Quantum Key Distribution and String Oblivious Transfer in Noisy ChannelsDominic Mayers. 343-357 [doi]
- Linear Complexity of Periodic Sequences: A General TheoryJames L. Massey, Shirlei Serconek. 358-371 [doi]
- Generalization of Siegenthaler Inequality and Schnorr-Vaudenay MultipermutationsPaul Camion, Anne Canteaut. 372-386 [doi]
- Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key DistributionCarlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson. 387-400 [doi]
- New Results on Visual CryptographyStefan Droste. 401-415 [doi]