Abstract is missing.
- Efficient Private Matching and Set IntersectionMichael J. Freedman, Kobbi Nissim, Benny Pinkas. 1-19 [doi]
- Positive Results and Techniques for ObfuscationBen Lynn, Manoj Prabhakaran, Amit Sahai. 20-39 [doi]
- Secure Computation of the k th-Ranked ElementGagan Aggarwal, Nina Mishra, Benny Pinkas. 40-55 [doi]
- Short Signatures Without Random OraclesDan Boneh, Xavier Boyen. 56-73 [doi]
- Sequential Aggregate Signatures from Trapdoor PermutationsAnna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham. 74-90 [doi]
- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum TransmissionIvan Damgård, Thomas Pedersen, Louis Salvail. 91-108 [doi]
- The Exact Price for Unconditionally Secure Asymmetric CryptographyRenato Renner, Stefan Wolf. 109-125 [doi]
- On Generating the Initial Key in the Bounded-Storage ModelStefan Dziembowski, Ueli M. Maurer. 126-137 [doi]
- Practical Large-Scale Distributed Key GenerationJohn F. Canny, Stephen Sorkin. 138-152 [doi]
- Optimal Communication Complexity of Generic Multicast Key DistributionDaniele Micciancio, Saurabh Panjwani. 153-170 [doi]
- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption ProblemMihir Bellare, Alexandra Boldyreva, Adriana Palacio. 171-188 [doi]
- Black-Box Composition Does Not Imply Adaptive SecuritySteven Myers. 189-206 [doi]
- Chosen-Ciphertext Security from Identity-Based EncryptionRan Canetti, Shai Halevi, Jonathan Katz. 207-222 [doi]
- Efficient Selective-ID Secure Identity-Based Encryption Without Random OraclesDan Boneh, Xavier Boyen. 223-238 [doi]
- Construction of Secure Random Curves of Genus 2 over Prime FieldsPierrick Gaudry, Éric Schost. 239-256 [doi]
- Projective Coordinates LeakDavid Naccache, Nigel P. Smart, Jacques Stern. 257-267 [doi]
- Security Proofs for Identity-Based Identification and Signature SchemesMihir Bellare, Chanathip Namprempre, Gregory Neven. 268-286 [doi]
- Concurrent SignaturesLiqun Chen, Caroline Kudla, Kenneth G. Paterson. 287-305 [doi]
- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy SignaturesTal Malkin, Satoshi Obana, Moti Yung. 306-322 [doi]
- Public-Key SteganographyLuis von Ahn, Nicholas J. Hopper. 323-341 [doi]
- Immunizing Encryption Schemes from Decryption ErrorsCynthia Dwork, Moni Naor, Omer Reingold. 342-360 [doi]
- Secure Hashed Diffie-Hellman over Non-DDH GroupsRosario Gennaro, Hugo Krawczyk, Tal Rabin. 361-381 [doi]
- On Simulation-Sound Trapdoor CommitmentsPhilip D. MacKenzie, Ke Yang. 382-400 [doi]
- Hash Function Balance and Its Impact on Birthday AttacksMihir Bellare, Tadayoshi Kohno. 401-418 [doi]
- Multi-party Computation with Hybrid SecurityMatthias Fitzi, Thomas Holenstein, Jürg Wullschleger. 419-438 [doi]
- On the Hardness of Information-Theoretic Multiparty ComputationYuval Ishai, Eyal Kushilevitz. 439-455 [doi]
- Dining Cryptographers RevisitedPhilippe Golle, Ari Juels. 456-473 [doi]
- Algebraic Attacks and Decomposition of Boolean FunctionsWilli Meier, Enes Pasalic, Claude Carlet. 474-491 [doi]
- Finding Small Roots of Bivariate Integer Polynomial Equations RevisitedJean-Sébastien Coron. 492-505 [doi]
- Public Key Encryption with Keyword SearchDan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano. 506-522 [doi]
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataYevgeniy Dodis, Leonid Reyzin, Adam Smith. 523-540 [doi]
- Merkle Tree Traversal in Log Space and TimeMichael Szydlo. 541-554 [doi]
- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3Phong Q. Nguyen. 555-570 [doi]
- Traceable SignaturesAggelos Kiayias, Yiannis Tsiounis, Moti Yung. 571-589 [doi]
- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow SchemeStanislaw Jarecki, Vitaly Shmatikov. 590-608 [doi]
- Anonymous Identification in Ad Hoc GroupsYevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup. 609-626 [doi]