Abstract is missing.
- Cryptanalysis of RSA with Private Key ::::d:::: Less than ::::N:::::::0.292:::Dan Boneh, Glenn Durfee. 1-11 [doi]
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible DifferentialsEli Biham, Alex Biryukov, Adi Shamir. 12-23 [doi]
- Lower Bounds for Oblivious Transfer ReductionsYevgeniy Dodis, Silvio Micali. 42-55 [doi]
- On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security AssumptionsIvan Damgård, Joe Kilian, Louis Salvail. 56-73 [doi]
- Conditional Oblivious Transfer and Timed-Release EncryptionGiovanni Di Crescenzo, Rafail Ostrovsky, Sivaramakrishnan Rajagopalan. 74-89 [doi]
- An Efficient ::::Threshold:::: Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext AttackRan Canetti, Shafi Goldwasser. 90-106 [doi]
- Proving in Zero-Knowledge that a Number Is the Product of Two Safe PrimesJan Camenisch, Markus Michels. 107-122 [doi]
- Secure Hash-and-Sign Signatures Without the Random OracleRosario Gennaro, Shai Halevi, Tal Rabin. 123-139 [doi]
- A Note on the Limits of Collusion-Resistant WatermarksFunda Ergün, Joe Kilian, Ravi Kumar. 140-149 [doi]
- Coin-Based Anonymous FingerprintingBirgit Pfitzmann, Ahmad-Reza Sadeghi. 150-164 [doi]
- On the Performance of Hyperelliptic CryptosystemsNigel P. Smart. 165-175 [doi]
- Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher CharacteristicTetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, Fumitaka Hoshino. 176-189 [doi]
- Comparing the MOV and FR Reductions in Elliptic Curve CryptographyRyuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai. 190-205 [doi]
- Unbalanced Oil and Vinegar Signature SchemesAviad Kipnis, Jacques Patarin, Louis Goubin. 206-222 [doi]
- New Public Key Cryptosystems Based on the Dependent-RSA ProblemsDavid Pointcheval. 239-254 [doi]
- Resistance Against General Iterated AttacksSerge Vaudenay. 255-271 [doi]
- XOR and Non-XOR Differential ProbabilitiesPhilip Hawkes, Luke O Connor. 272-285 [doi]
- S-boxes with Controllable NonlinearityJung Hee Cheon, Seongtaek Chee, Choonsik Park. 286-294 [doi]
- Secure Distributed Key Generation for Discrete-Log Based CryptosystemsRosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin. 295-310 [doi]
- Efficient Multiparty Computations Secure Against an Adaptive AdversaryRonald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin. 311-326 [doi]
- Distributed Pseudo-random Functions and KDCsMoni Naor, Benny Pinkas, Omer Reingold. 327-346 [doi]
- Improved Fast Correlation Attacks on Stream Ciphers via Convolutional CodesThomas Johansson, Fredrik Jönsson. 347-362 [doi]
- Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron ProblemLars R. Knudsen, Willi Meier. 363-374 [doi]
- An Analysis of Exponentiation Based on Formal LanguagesLuke O Connor. 375-388 [doi]
- Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret KeyTakaaki Mizuki, Hiroki Shizuya, Takao Nishizeki. 389-401 [doi]
- Computationally Private Information Retrieval with Polylogarithmic CommunicationChristian Cachin, Silvio Micali, Markus Stadler. 402-414 [doi]
- On the Concurrent Composition of Zero-Knowledge ProofsRansom Richardson, Joe Kilian. 415-431 [doi]
- Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and ApplicationsMarc Fischlin. 432-445 [doi]
- Efficient Communication-Storage Tradeoffs for Multicast EncryptionRan Canetti, Tal Malkin, Kobbi Nissim. 459-474 [doi]