Abstract is missing.
- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving BuffersNathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan. 1-19 [doi]
- A Simple Related-Key Attack on the Full SHACAL-1Eli Biham, Orr Dunkelman, Nathan Keller. 20-30 [doi]
- Impossibility Proofs for RSA Signatures in the Standard ModelPascal Paillier. 31-48 [doi]
- Selecting Secure PasswordsEric R. Verheul. 49-66 [doi]
- Human Identification Through Image Evaluation Using Secret PredicatesHassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee. 67-84 [doi]
- Cryptanalysis of Reduced Variants of the FORK-256 Hash FunctionFlorian Mendel, Joseph Lano, Bart Preneel. 85-100 [doi]
- Second Preimages for SMASHMario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen. 101-111 [doi]
- A Practical Optimal Padding for Signature SchemesHaifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang. 112-128 [doi]
- Directed Transitive Signature SchemeXun Yi. 129-144 [doi]
- Identity-Based Multi-signatures from RSAMihir Bellare, Gregory Neven. 145-162 [doi]
- Improved Efficiency for Private Stable MatchingMatthew K. Franklin, Mark Gondree, Payman Mohassel. 163-177 [doi]
- Compact E-Cash from Bounded AccumulatorMan Ho Au, Qianhong Wu, Willy Susilo, Yi Mu. 178-195 [doi]
- Batch Processing of Interactive ProofsKoji Chida, Go Yamamoto. 196-207 [doi]
- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash CallsJoseph H. Silverman, William Whyte. 208-224 [doi]
- Predicting Secret Keys Via Branch PredictionOnur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert. 225-242 [doi]
- Template Attacks on Masking - Resistance Is FutileElisabeth Oswald, Stefan Mangard. 243-256 [doi]
- Differential Power Analysis of Stream CiphersWieland Fischer, Berndt M. Gammel, O. Kniffler, J. Velten. 257-270 [doi]
- Cache Based Remote Timing Attack on the AESOnur Aciiçmez, Werner Schindler, Çetin Kaya Koç. 271-286 [doi]
- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key AgreementStanislaw Jarecki, Jihye Kim, Gene Tsudik. 287-308 [doi]
- Efficient Password-Authenticated Key Exchange Based on RSASangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won. 309-323 [doi]
- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy ChannelsYvo Desmedt, Goce Jakimoski. 324-338 [doi]
- A Practical and Tightly Secure Signature Scheme Without Hash FunctionBenoît Chevallier-Mames, Marc Joye. 339-356 [doi]
- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable SignatureRon Steinfeld, Josef Pieprzyk, Huaxiong Wang. 357-371 [doi]
- Public Key Cryptography and RFID TagsMáire McLoone, Matthew J. B. Robshaw. 372-384 [doi]
- A Bit-Slice Implementation of the Whirlpool Hash FunctionKarl Scheibelhofer. 385-401 [doi]