Abstract is missing.
- Forward-Security in Private-Key CryptographyMihir Bellare, Bennet S. Yee. 1-18 [doi]
- Intrusion-Resilient Public-Key EncryptionYevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung. 19-32 [doi]
- TMAC: Two-Key CBC MACKaoru Kurosawa, Tetsu Iwata. 33-49 [doi]
- Montgomery Prime Hashing for Message AuthenticationDouglas L. Whiting, Michael J. Sabin. 50-67 [doi]
- An Analysis of Proxy Signatures: Is a Secure Channel Necessary?Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim. 68-79 [doi]
- Invisibility and Anonymity of Undeniable and Confirmer SignaturesSteven D. Galbraith, Wenbo Mao. 80-97 [doi]
- A Secure Signature Scheme from Bilinear MapsDan Boneh, Ilya Mironov, Victor Shoup. 98-110 [doi]
- Access Control Using Pairing Based CryptographyNigel P. Smart. 111-121 [doi]
- NTRUSIGN: Digital Signatures Using the NTRU LatticeJeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte. 122-140 [doi]
- About the XL Algorithm over GF(2)Nicolas Courtois, Jacques Patarin. 141-157 [doi]
- Efficient GF(p:::m:::) Arithmetic Architectures for Cryptographic ApplicationsGuido Bertoni, Jorge Guajardo, Sandeep S. Kumar, Gerardo Orlando, Christof Paar, Thomas J. Wollinger. 158-175 [doi]
- Hardware Performance Characterization of Block Cipher StructuresLu Xiao, Howard M. Heys. 176-192 [doi]
- Simple Identity-Based Cryptography with Mediated RSAXuhua Ding, Gene Tsudik. 193-210 [doi]
- Two Birds One Stone: Signcryption Using RSAJohn Malone-Lee, Wenbo Mao. 211-225 [doi]
- Cryptography after the Bubble: How to Make an Impact on the WorldThomas A. Berson. 226 [doi]
- Rethinking Chosen-Ciphertext Security under Kerckhoffs AssumptionSeungjoo Kim, Masahiro Mambo, Yuliang Zheng. 227-243 [doi]
- Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian MixesBodo Möller. 244-262 [doi]
- Fault Tolerant and DistributedBroadcast EncryptionPaolo D Arco, Douglas R. Stinson. 263-280 [doi]
- Shared Generation of Pseudo-Random Functions with Cumulative MapsHuaxiong Wang, Josef Pieprzyk. 281-294 [doi]
- Authenticated Data Structures for Graph and Geometric SearchingMichael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, Robert F. Cohen. 295-313 [doi]
- Fractal Merkle Tree Representation and TraversalMarkus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo. 314-326 [doi]
- RSA ShortcutsAdi Shamir. 327 [doi]
- The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel AttacksKatsuyuki Okeya, Tsuyoshi Takagi. 328-342 [doi]
- Fast Elliptic Curve Arithmetic and Improved Weil Pairing EvaluationKirsten Eisenträger, Kristin Lauter, Peter L. Montgomery. 343-354 [doi]
- Two Efficient and Provably Secure Schemes for Server-Assisted Threshold SignaturesShouhuai Xu, Ravi S. Sandhu. 355-372 [doi]
- Secure Applications of Pedersen s Distributed Key Generation ProtocolRosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin. 373-390 [doi]
- Seeing through MIST Given a Small Fraction of an RSA Private KeyColin D. Walter. 391-402 [doi]
- Simple Backdoors for RSA Key GenerationClaude Crépeau, Alain Slakmon. 403-416 [doi]