Abstract is missing.
- On the Security of RSA PaddingJean-Sébastien Coron, David Naccache, Julien P. Stern. 1-18 [doi]
- Cryptanalysis of the HFE Public Key Cryptosystem by RelinearizationAviad Kipnis, Adi Shamir. 19-30 [doi]
- The Hardness of the Hidden Subset Sum Problem and Its Cryptographic ImplicationsPhong Q. Nguyen, Jacques Stern. 31-46 [doi]
- Information-Theoretic CryptographyUeli M. Maurer. 47-64 [doi]
- Information Theoretically Secure Communication in the Limited Storage Space ModelYonatan Aumann, Michael O. Rabin. 65-79 [doi]
- The All-or-Nothing Nature of Two-Party Secure ComputationAmos Beimel, Tal Malkin, Silvio Micali. 80-97 [doi]
- Adaptive Security for Threshold CryptosystemsRan Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin. 98-115 [doi]
- Two Party RSA Key GenerationNiv Gilboa. 116-129 [doi]
- Robust Distributed Multiplicaton with out InteractionMasayuki Abe. 130-147 [doi]
- A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to ElectronicBerry Schoenmakers. 148-164 [doi]
- Truncated Differentials and SkipjackLars R. Knudsen, Matthew J. B. Robshaw, David Wagner. 165-180 [doi]
- Fast Correlation Attacks Based on Turbo Code TechniquesThomas Johansson, Fredrik Jönsson. 181-197 [doi]
- Highly Nonlinear Resilient Functions Optimizing Siegenthaler s InequalitySubhamoy Maitra, Palash Sarkar. 198-215 [doi]
- UMAC: Fast and Secure Message AuthenticationJohn Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway. 216-233 [doi]
- SQUARE HASH: Fast Message Authenication via Optimized Universal Hash FunctionsMark Etzel, Sarvar Patel, Zulfikar Ramzan. 234-251 [doi]
- Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened AssumptionsJee Hea An, Mihir Bellare. 252-269 [doi]
- Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday BarrierMihir Bellare, Oded Goldreich, Hugo Krawczyk. 270-287 [doi]
- Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto 97Phong Q. Nguyen. 288-304 [doi]
- Weakness in Quaternion SignaturesDon Coppersmith. 305-314 [doi]
- Cryptanalysis of 2 R SchemesDingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai. 315-325 [doi]
- Factoring N = p:::r:::q for Large rDan Boneh, Glenn Durfee, Nick Howgrave-Graham. 326-337 [doi]
- An Efficient Public Key Traitor Tracing SchemeDan Boneh, Matthew K. Franklin. 338-353 [doi]
- Dynamic Traitor TrainingAmos Fiat, Tamir Tassa. 354-371 [doi]
- Efficient Methods for Integrating Traceability and Broadcast EncryptionEli Gafni, Jessica Staddon, Yiqun Lisa Yin. 372-387 [doi]
- Differential Power AnalysisPaul C. Kocher, Joshua Jaffe, Benjamin Jun. 388-397 [doi]
- Towards Sound Approaches to Counteract Power-Analysis AttacksSuresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi. 398-412 [doi]
- Separability and Efficiency for Generic Group Signature SchemesJan Camenisch, Markus Michels. 413-430 [doi]
- A Forward-Secure Digital Signature SchemeMihir Bellare, Sara K. Miner. 431-448 [doi]
- Abuse-Free Optimistic Contract SigningJuan A. Garay, Markus Jakobsson, Philip D. MacKenzie. 449-466 [doi]
- Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZKOded Goldreich, Amit Sahai, Salil P. Vadhan. 467-484 [doi]
- On Concurrent Zero-Knowledge with Pre-processingGiovanni Di Crescenzo, Rafail Ostrovsky. 485-502 [doi]
- On the Security Properties of OAEP as an All-or-Nothing TransformVictor Boyko. 503-518 [doi]
- Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based CharacterizationMihir Bellare, Amit Sahai. 519-536 [doi]
- Secure Integration of Asymmetric and Symmetric Encryption SchemesEiichiro Fujisaki, Tatsuaki Okamoto. 537-554 [doi]
- Auditable, Anonymous Electronic Cash Extended AbstractTomas Sander, Amnon Ta-Shma. 555-572 [doi]
- Oblivious Transfer with Adaptive QueriesMoni Naor, Benny Pinkas. 573-590 [doi]
- Compressing Cryptographic ResourcesNiv Gilboa, Yuval Ishai. 591-608 [doi]
- Coding Constructions for Blacklisting Problems without Computational AssumptionsRavi Kumar, Sridhar Rajagopalan, Amit Sahai. 609-623 [doi]
- An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution SchemesRadha Poovendran, John S. Baras. 624-638 [doi]