Abstract is missing.
- Minimizing the use of random oracles in authenticated encryption schemesMihir Bellare, Phillip Rogaway. 1-16
- Zero-knowledge proofs of decision power: new protocols and optimal round-complexityGiovanni Di Crescenzo, Kouichi Sakurai, Moti Yung. 17-27
- Computational learning theoretic cryptanalysis of language theoretic cryptosystemsTakeshi Koshiba. 28-38
- A language for specifying sequences of authorization transformations and its applicationsYun Bai, Vijay Varadharajan. 39-49
- On the decomposition constructions for perfect secret sharing schemesHung-Min Sun, Bor-Liang Chen. 50-60
- Traceable visual cryptographyIngrid Biehl, Susanne Wetzel. 61-71
- Remarks on the multiple assignment secret sharing schemeHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini. 72-80
- Secret sharing in hierarchical groupsChris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini. 81-86
- Stateless connectionsTuomas Aura, Pekka Nikander. 87-97
- Design of a security platform for CORBA based applicationRakman Choi, Jung-Chan Na, Kwonil Lee, Eunmi Kim, Wooyong Han. 98-108
- Secure document management and distribution in an open network environmentAntonio Lioy, Fabio Maino, Marco Mezzalama. 109-117
- A:::2:::-code = Affine resolvable = BIBDSatoshi Obana, Kaoru Kurosawa. 118-129
- Multisender authentication systems with unconditional securityKeith M. Martin, Reihaneh Safavi-Naini. 130-143
- Proposal of user identification scheme using mouseKenichi Hayashi, Eiji Okamoto, Masahiro Mambo. 144-148
- An effective genetic algorithm for finding highly nonlinear Boolean FunctionsWilliam Millan, Andrew Clark, Ed Dawson. 149-158
- Duality of Boolean functions and its cryptographic significanceXian-Mo Zhang, Yuliang Zheng, Hideki Imai. 159-169
- Construction of correlation immune Boolean functionsEd Dawson, Chuan-Kun Wu. 170-180
- An improved key stream generator based on the programmable cellular automataMiodrag J. Mihaljevic. 181-191
- A Trust policy frameworkAudun Jøsang. 192-202
- Critical analysis of security in voice hiding techniquesLiWu Chang, Ira S. Moskowitz. 203-216
- Two efficient RSA multisignature schemesSangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won. 217-222
- Proxy signatures, RevisitedSeungjoo Kim, Sangjoon Park, Dongho Won. 223-232
- Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEAJohn Kelsey, Bruce Schneier, David Wagner. 233-246
- A multiplication-addition structure against differential attackFeng Zhu, Bao-An Guo. 247-257
- On strict estimation method of provable security against differential and linear cryptanalysisYasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta. 258-268
- Improved fast software implementation of block ciphersTakeshi Shimoyama, Seiichi Amada, Shiho Moriai. 269-273
- Security comments on the Hwang-Chen algebraic-code cryptosystemMohssen Alabbadi. 274-281
- Efficient elliptic curve exponentiationAtsuko Miyaji, Takatoshi Ono, Henri Cohen. 282-291
- Efficient construction of secure hyperelliptic discrete logarithm problemsJinhui Chao, Nori Matsuda, Shigeo Tsujii. 292-301
- A new and optimal chosen-message attack on RSA-type cryptosystemsDaniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater. 302-313
- On weak RSA-keys produced from Pretty Good PrivacyYasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka. 314-324
- Self-synchronized message randomization methods for subliminal channelsKazukuni Kobara, Hideki Imai. 325-334
- Hiding the Hidden: A software system for concealing ciphertext as innocuous textMark Chapman, George I. Davida. 335-345
- Digital signature and public key cryptosystems in a prime order subgroup of Z::n:::::*:::Colin Boyd. 346-355
- Trapdoor one-way permutations and multivariate polynominalsJacques Patarin, Louis Goubin. 356-368
- Asymmetric cryptography with S-BoxesJacques Patarin, Louis Goubin. 369-380
- On the powerline systemPaul Camion, Hervé Chabanne. 381-385
- Making unfair a "fair" blind signature schemeJacques Traoré. 386-397
- Enforcing traceability in softwareColin Boyd. 398-408
- Publicly verifiable partial key escrowWenbo Mao. 409-413
- A secure code for recipient watermarking against conspiracy attacks by all usersHajime Watanabe, Tadao Kasami. 414-423
- Protocols for issuing public-key certificates over the InternetJames W. Gray III, Kin Fai Epsilon Ip. 424-434
- Distributed cryptographic function application protocolsAndré Postma, Thijs Krol, Egbert Molenkamp. 435-439
- Fault tolerant anonymous channelWakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori Takatani. 440-444
- An implementable scheme for secure delegation of computing and dataJosep Domingo-Ferrer, Ricardo X. Sanchez del Castillo. 445-451
- Electronic commerce with secure intelligent trade agentJacobus E. van der Merwe, Sebastiaan H. von Solms. 452-462
- Efficient scalable fair cash with off-line extortion preventionHolger Peterson, Guillaume Poupard. 463-477
- An anonymous and undeniable payment schemeLiqun Chen, Chris J. Mitchell. 478-482