Abstract is missing.
- Security Analysis of the Strong Diffie-Hellman ProblemJung Hee Cheon. 1-11 [doi]
- Cryptography in Theory and Practice: The Case of Encryption in IPsecKenneth G. Paterson, Arnold K. L. Yau. 12-29 [doi]
- Polynomial Equivalence Problems: Algorithmic and Theoretical AspectsJean-Charles Faugère, Ludovic Perret. 30-47 [doi]
- Alien ::::vs.:::: Quine, the Vanishing Circuit and Other Tales from the Industry s CryptVanessa Gratzer, David Naccache. 48-58 [doi]
- Hiding Secret Points Amidst ChaffEe-Chien Chang, Qiming Li. 59-72 [doi]
- Parallel and Concurrent Security of the HB and HB:::+::: ProtocolsJonathan Katz, Ji Sun Shin. 73-87 [doi]
- Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric ProtocolTal Moran, Moni Naor. 88-108 [doi]
- QUAD: A Practical Stream Cipher with Provable SecurityCôme Berbain, Henri Gilbert, Jacques Patarin. 109-128 [doi]
- How to Strengthen Pseudo-random Generators by Using CompressionAline Gouget, Hervé Sibert. 129-146 [doi]
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic AttacksFrederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli 0002, Willi Meier, Olivier Ruatta. 147-164 [doi]
- VSH, an Efficient and Provable Collision-Resistant Hash FunctionScott Contini, Arjen K. Lenstra, Ron Steinfeld. 165-182 [doi]
- Herding Hash Functions and the Nostradamus AttackJohn Kelsey, Tadayoshi Kohno. 183-200 [doi]
- Optimal Reductions Between Oblivious Transfers Using Interactive HashingClaude Crépeau, George Savvides. 201-221 [doi]
- Oblivious Transfer Is SymmetricStefan Wolf, Jürg Wullschleger. 222-232 [doi]
- Symplectic Lattice Reduction and NTRUNicolas Gama, Nick Howgrave-Graham, Phong Q. Nguyen. 233-253 [doi]
- The Function Field Sieve in the Medium Prime CaseAntoine Joux, Reynald Lercier. 254-270 [doi]
- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU SignaturesPhong Q. Nguyen, Oded Regev. 271-288 [doi]
- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard ModelAlexander W. Dent. 289-307 [doi]
- Private Circuits II: Keeping Secrets in Tamperable CircuitsYuval Ishai, Manoj Prabhakaran, Amit Sahai, David Wagner. 308-327 [doi]
- Composition Implies Adaptive Security in MinicryptKrzysztof Pietrzak. 328-338 [doi]
- Perfect Non-interactive Zero Knowledge for NPJens Groth, Rafail Ostrovsky, Amit Sahai. 339-358 [doi]
- Language Modeling and Encryption on Packet Switched NetworksKevin S. McCurley. 359-372 [doi]
- A Provable-Security Treatment of the Key-Wrap ProblemPhillip Rogaway, Thomas Shrimpton. 373-390 [doi]
- Luby-Rackoff Ciphers from Weak Round Functions?Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin. 391-408 [doi]
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing ProofsMihir Bellare, Phillip Rogaway. 409-426 [doi]
- Compact Group Signatures Without Random OraclesXavier Boyen, Brent Waters. 427-444 [doi]
- Practical Identity-Based Encryption Without Random OraclesCraig Gentry. 445-464 [doi]
- Sequential Aggregate Signatures and Multisignatures Without Random OraclesSteve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters. 465-485 [doi]
- Our Data, Ourselves: Privacy Via Distributed Noise GenerationCynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, Moni Naor. 486-503 [doi]
- On the (Im-)Possibility of Extending Coin TossDennis Hofheinz, Jörn Müller-Quade, Dominique Unruh. 504-521 [doi]
- Efficient Binary Conversion for Paillier Encrypted ValuesBerry Schoenmakers, Pim Tuyls. 522-537 [doi]
- Information-Theoretic Conditions for Two-Party Secure Function EvaluationClaude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger. 538-554 [doi]
- Unclonable Group IdentificationIvan Damgård, Kasper Dupont, Michael Østergaard Pedersen. 555-572 [doi]
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private KeysDan Boneh, Amit Sahai, Brent Waters. 573-592 [doi]
- Simplified Threshold RSA with Adaptive and Proactive SecurityJesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen. 593-611 [doi]