Abstract is missing.
- Securing Threshold Cryptosystems against Chosen Ciphertext AttackVictor Shoup, Rosario Gennaro. 1-16 [doi]
- Auto-Recoverable Auto-Certifiable CryptosystemsAdam Young, Moti Yung. 17-31 [doi]
- A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its ApplicationsEiichiro Fujisaki, Tatsuaki Okamoto. 32-46 [doi]
- Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Z::n:: and Factoring nNoboru Kunihiro, Kenji Koyama. 47-58 [doi]
- Breaking RSA May Not Be Equivalent to FactoringDan Boneh, Ramarathnam Venkatesan. 59-71 [doi]
- Lower Bounds on Generic Algorithms in GroupsUeli M. Maurer, Stefan Wolf. 72-84 [doi]
- Improved Cryptanalysis of RC5Alex Biryukov, Eyal Kushilevitz. 85-99 [doi]
- Cryptanalysis of the ANSI X9.52 CBCM ModeEli Biham, Lars R. Knudsen. 100-111 [doi]
- Differential-Linear Weak Key Classes of IDEAPhilip Hawkes. 112-126 [doi]
- Divertible Protocols and Atomic Proxy CryptographyMatt Blaze, Gerrit Bleumer, Martin Strauss. 127-144 [doi]
- Optimum Traitor Tracing and Asymmetric SchemesKaoru Kurosawa, Yvo Desmedt. 145-157 [doi]
- On Finding Small Solutions of Modular Multivariate Polynomial EquationsCharanjit S. Jutla. 158-170 [doi]
- Computing Discrete Logarithms with Quadratic Number RingsDamian Weber. 171-183 [doi]
- Improved Algorithms for Isomorphisms of PolynomialsJacques Patarin, Louis Goubin, Nicolas Courtois. 184-200 [doi]
- Visual CryptanalysisAdi Shamir. 201-210 [doi]
- How to Improve an Exponentiation Black-BoxGérard D. Cohen, Antoine Lobstein, David Naccache, Gilles Zémor. 211-220 [doi]
- Speeding up Discrete Log and Factoring Based Schemes via PrecomputationsVictor Boyko, Marcus Peinado, Ramarathnam Venkatesan. 221-235 [doi]
- Fast Batch Verification for Modular Exponentiation and Digital SignaturesMihir Bellare, Juan A. Garay, Tal Rabin. 236-250 [doi]
- A Formal Treatment of Remotely Keyed EncryptionMatt Blaze, Joan Feigenbaum, Moni Naor. 251-265 [doi]
- Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertibleMihir Bellare, Ted Krovetz, Phillip Rogaway. 266-280 [doi]
- The Chain & Sum Primitive and Its Applications to MACs and Stream CiphersMariusz H. Jakubowski, Ramarathnam Venkatesan. 281-293 [doi]
- A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast DecryptionDetlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi. 294-307 [doi]
- A New Public-Key Cryptosystem as Secure as FactoringTatsuaki Okamoto, Shigenori Uchiyama. 308-318 [doi]
- Towards a Better Understanding of One-Wayness: Facing Linear PermutationsAlain P. Hiltgen. 319-333 [doi]
- Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions?Daniel R. Simon. 334-345 [doi]
- Secure Communications in Minimal Connectivity ModelsMatthew K. Franklin, Rebecca N. Wright. 346-360 [doi]
- On the Foundations of Oblivious TransferChristian Cachin. 361-374 [doi]
- Quorum-Based Secure Multi-party ComputationDonald Beaver, Avishai Wool. 375-390 [doi]
- Strengthened Security for Blind SignaturesDavid Pointcheval. 391-405 [doi]
- Generic Constructions for Secure and Efficient Confirmer Signature SchemesMarkus Michels, Markus Stadler. 406-421 [doi]
- Security Analysis of a Practical on the fly Authentication and Signature GenerationGuillaume Poupard, Jacques Stern. 422-436 [doi]
- Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-serversMasayuki Abe. 437-447 [doi]
- A Practical MixMarkus Jakobsson. 448-461 [doi]
- On the Propagation Criterion of Degree l and Order kClaude Carlet. 462-474 [doi]
- Highly Nonlinear Balanced Boolean Functions with a Good Correlation-ImmunityEric Filiol, Caroline Fontaine. 475-488 [doi]
- Heuristic Design of Cryptographically Strong Balanced Boolean FunctionsWilliam Millan, Andrew Clark, Ed Dawson. 489-499 [doi]
- Combinatorial Bounds for Broadcast EncryptionMichael Luby, Jessica Staddon. 512-526 [doi]
- New Results on Multi-Receiver Authentication CodesReihaneh Safavi-Naini, Huaxiong Wang. 527-541 [doi]
- Specialized Integer FactorizationDon Coppersmith. 542-545 [doi]
- Security of an Identity-Based Cryptosystem and the Related ReductionsTatsuaki Okamoto, Shigenori Uchiyama. 546-560 [doi]
- Easy Come - Easy Go Divisible CashAgnes Hui Chan, Yair Frankel, Yiannis Tsiounis. 561-575 [doi]
- Secure and Efficient MeteringMoni Naor, Benny Pinkas. 576-590 [doi]
- Optimistic Fair Exchange of Digital Signatures (Extended Abstract)N. Asokan, Victor Shoup, Michael Waidner. 591-606 [doi]