Abstract is missing.
- Cryptanalysis of the Hash Functions MD4 and RIPEMDXiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu. 1-18 [doi]
- How to Break MD5 and Other Hash FunctionsXiaoyun Wang, Hongbo Yu. 19-35 [doi]
- Collisions of SHA-0 and Reduced SHA-1Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby. 36-57 [doi]
- Reducing Complexity Assumptions for Statistically-Hiding CommitmentIftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel. 58-77 [doi]
- Smooth Projective Hashing and Two-Message Oblivious TransferYael Tauman Kalai. 78-95 [doi]
- On Robust Combiners for Oblivious Transfer and Other PrimitivesDanny Harnik, Joe Kilian, Moni Naor, Omer Reingold, Alon Rosen. 96-113 [doi]
- Efficient Identity-Based Encryption Without Random OraclesBrent Waters. 114-127 [doi]
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEMMasayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup. 128-146 [doi]
- Secure Remote Authentication Using Biometric DataXavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith. 147-163 [doi]
- Stronger Security Bounds for Wegman-Carter-Shoup AuthenticatorsDaniel J. Bernstein. 164-180 [doi]
- 3-Move Undeniable Signature SchemeKaoru Kurosawa, Swee-Huay Heng. 181-197 [doi]
- Group Signatures with Efficient Concurrent JoinAggelos Kiayias, Moti Yung. 198-214 [doi]
- Floating-Point LLL RevisitedPhong Q. Nguyen, Damien Stehlé. 215-233 [doi]
- Practical Cryptography in High Dimensional ToriMarten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff. 234-250 [doi]
- A Tool Kit for Finding Small Roots of Bivariate Polynomials over the IntegersJohannes Blömer, Alexander May. 251-267 [doi]
- Computational Indistinguishability Between Quantum States and Its Cryptographic ApplicationAkinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami. 268-284 [doi]
- Approximate Quantum Error-Correcting Codes and Secret Sharing SchemesClaude Crépeau, Daniel Gottesman, Adam Smith. 285-301 [doi]
- Compact E-CashJan Camenisch, Susan Hohenberger, Anna Lysyanskaya. 302-321 [doi]
- Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract)Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek. 322-340 [doi]
- Differential Cryptanalysis for Multivariate SchemesPierre-Alain Fouque, Louis Granboulan, Jacques Stern. 341-353 [doi]
- A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret ProblemLudovic Perret. 354-370 [doi]
- Partial Key Exposure Attacks on RSA up to Full Size ExponentsMatthias Ernst, Ellen Jochemsz, Alexander May, Benne de Weger. 371-386 [doi]
- The RSA Group is Pseudo-FreeDaniele Micciancio. 387-403 [doi]
- Universally Composable Password-Based Key ExchangeRan Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie. 404-421 [doi]
- Mercurial Commitments with Applications to Zero-Knowledge SetsMelissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin. 422-439 [doi]
- Hierarchical Identity Based Encryption with Constant Size CiphertextDan Boneh, Xavier Boyen, Eu-Jin Goh. 440-456 [doi]
- Fuzzy Identity-Based EncryptionAmit Sahai, Brent Waters. 457-473 [doi]
- Second Preimages on n-Bit Hash Functions for Much Less than 2:::n::: WorkJohn Kelsey, Bruce Schneier. 474-490 [doi]
- Predicting and Distinguishing Attacks on RC4 Keystream GeneratorItsik Mantin. 491-506 [doi]
- Related-Key Boomerang and Rectangle AttacksEli Biham, Orr Dunkelman, Nathan Keller. 507-525 [doi]
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash FunctionsJohn Black, Martin Cochran, Thomas Shrimpton. 526-541 [doi]
- Public Traceability in Traitor Tracing SchemesHervé Chabanne, Duong Hieu Phan, David Pointcheval. 542-558 [doi]
- One-Way Chain Based Broadcast Encryption SchemesNam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong-Hoon Lee, Eun Sun Yoo. 559-574 [doi]