Abstract is missing.
- Sub-linear Queries Statistical Databases: Privacy with PowerCynthia Dwork. 1-6 [doi]
- Malicious Cryptography: Kleptographic AspectsAdam Young, Moti Yung. 7-18 [doi]
- Resistance of SNOW 2.0 Against Algebraic AttacksOlivier Billet, Henri Gilbert. 19-28 [doi]
- A Study of the Security of Unbalanced Oil and Vinegar Signature SchemesAn Braeken, Christopher Wolf, Bart Preneel. 29-43 [doi]
- Hold Your Sessions: An Attack on Java Session-Id GenerationZvi Gutterman, Dahlia Malkhi. 44-57 [doi]
- Update on SHA-1Vincent Rijmen, Elisabeth Oswald. 58-71 [doi]
- A Fast Correlation Attack on the Shrinking GeneratorBin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao. 72-86 [doi]
- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based EncryptionDan Boneh, Jonathan Katz. 87-103 [doi]
- A Generic Conversion with Optimal RedundancyYang Cui, Kazukuni Kobara, Hideki Imai. 104-117 [doi]
- Choosing Parameter Sets forwithandNick Howgrave-Graham, Joseph H. Silverman, William Whyte. 118-135 [doi]
- Foundations of Group Signatures: The Case of Dynamic GroupsMihir Bellare, Haixia Shi, Chong Zhang. 136-153 [doi]
- Time-Selective Convertible Undeniable SignaturesFabien Laguillaumie, Damien Vergnaud. 154-171 [doi]
- On Tolerant Cryptographic ConstructionsAmir Herzberg. 172-190 [doi]
- Simple Password-Based Encrypted Key Exchange ProtocolsMichel Abdalla, David Pointcheval. 191-208 [doi]
- Hard Bits of the Discrete Log with Applications to Password AuthenticationPhilip D. MacKenzie, Sarvar Patel. 209-226 [doi]
- Proofs for Two-Server Password AuthenticationMichael Szydlo, Burton S. Kaliski Jr.. 227-244 [doi]
- Design and Analysis of Password-Based Key Derivation FunctionsFrances F. Yao, Yiqun Lisa Yin. 245-261 [doi]
- A New Two-Party Identity-Based Authenticated Key AgreementNoel McCullagh, Paulo S. L. M. Barreto. 262-274 [doi]
- Accumulators from Bilinear Pairings and ApplicationsLan Nguyen. 275-292 [doi]
- Computing the Tate PairingMichael Scott. 293-304 [doi]
- Fast and Proven Secure Blind Identity-Based Signcryption from PairingsTsz Hon Yuen, Victor K. Wei. 305-322 [doi]
- A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-BoxNele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede. 323-333 [doi]
- CryptoGraphics: Secret Key Cryptography Using Graphics CardsDebra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck. 334-350 [doi]
- Side-Channel Leakage of Masked CMOS GatesStefan Mangard, Thomas Popp, Berndt M. Gammel. 351-365 [doi]
- New Minimal Weight Representations for Left-to-Right Window MethodsJames A. Muir, Douglas R. Stinson. 366-383 [doi]