Abstract is missing.
- On the Relation between A-Codes and Codes Correcting Independent ErrorsThomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets. 1-11 [doi]
- Optimal Authentication SystemsReihaneh Safavi-Naini, L. Tombak. 12-27 [doi]
- Factoring Integers Using SIMD SievesBrandon Dixon, Arjen K. Lenstra. 28-39 [doi]
- Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite GroupsSimon R. Blackburn, Sean Murphy, Jacques Stern. 50-54 [doi]
- Differentially Uniform Mappings for CryptographyKaisa Nyberg. 55-64 [doi]
- On Almost Perfect Nonlinear PermutationsThomas Beth, Cunsheng Ding. 65-76 [doi]
- Two New Classes of Bent FunctionsClaude Carlet. 77-101 [doi]
- Boolean Functions Satisfying a Higher Order Strict Avalanche CriterionThomas W. Cusick. 102-117 [doi]
- Size of Shares and Probability of Cheating in Threshold SchemesMarco Carpentieri, Alfredo De Santis, Ugo Vaccaro. 118-125 [doi]
- Nonperfect Secret Sharing Schemes and MatroidsKaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii. 126-141 [doi]
- On the Linear Complexity of Products of Shift-Register SequencesRainer Göttfert, Harald Niederreiter. 151-158 [doi]
- Resynchronization Weaknesses in Synchronous Stream CiphersJoan Daemen, René Govaerts, Joos Vandewalle. 159-167 [doi]
- Blind Synchronization of m-Sequnces with Even SpanRichard A. Games, Joseph J. Rushanan. 168-180 [doi]
- On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract)Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng. 181-199 [doi]
- Practical and Provably Secure Release of a Secret and Exchange of SignaturesIvan Damgård. 200-217 [doi]
- Can O.S.S. be Repaired? Proposal for a New Practical Signature SchemeDavid Naccache. 233-239 [doi]
- On a Limitation of BAN LogicColin Boyd, Wenbo Mao. 240-247 [doi]
- Efficient Anonymous Channel and All/Nothing Election SchemeChoonsik Park, Kazutomo Itoh, Kaoru Kurosawa. 248-259 [doi]
- Untransferable Rights in a Client-Independent Server EnvironmentJosep Domingo-Ferrer. 260-266 [doi]
- Interactive Hashing Simplifies Zero-Knowledge Protocol DesignRafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung. 267-273 [doi]
- One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract)Josh Cohen Benaloh, Michael de Mare. 274-285 [doi]
- The Breaking of the AR Hash FunctionIvan Damgård, Lars R. Knudsen. 286-292 [doi]
- Collisions for the Compressin Function of MD5Bert den Boer, Antoon Bosselaers. 293-304 [doi]
- How to Find and Avoid Collisions for the Knapsack Hash FunctionJacques Patarin. 305-317 [doi]
- Single Term Off-Line CoinsNiels Ferguson. 318-328 [doi]
- Improved Privacy in Wallets with Observers (Extended Abstract)Ronald Cramer, Torben P. Pedersen. 329-343 [doi]
- Distance-Bounding Protocols (Extended Abstract)Stefan Brands, David Chaum. 344-359 [doi]
- On the Distribution of Characteristics in Bijective MappingsLuke O Connor. 360-370 [doi]
- On the Security of the IDEA Block CipherWilli Meier. 371-385 [doi]
- Linear Cryptoanalysis Method for DES CipherMitsuru Matsui. 386-397 [doi]
- Secret-Key Reconciliation by Public DiscussionGilles Brassard, Louis Salvail. 410-423 [doi]
- Global, Unpredictable Bit Generation Without BroadcastDonald Beaver, Nicol So. 424-434 [doi]
- On Schnorr s Preprocessing for Digital Signature SchemesPeter de Rooij. 435-439 [doi]
- Cryptoanalysis of the Chang-Wu-Chen Key Distribution SystemMike Burmester. 440-442 [doi]
- An Alternate Explanation of two BAN-logic failures Paul C. van Oorschot. 443-447 [doi]
- The Consequences of Trust in Shared Secret SchemesGustavus J. Simmons. 448-452 [doi]
- Markov Ciphers and Alternating GroupsG. Hornauer, W. Stephan, Ralph Wernsdorf. 453-460 [doi]
- On Key Distribution and Authentication in Mobile Radio NetworksChoonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, Shigeo Tsujii. 461-465 [doi]