Abstract is missing.
- On Probable Security for Conventional CryptographySerge Vaudenay. 1-16
- Correlation Properties of the Bluetooth Combiner GeneratorMiia Hermelin, Kaisa Nyberg. 17-29
- Preventing Double-Spent Coins from Revealing User s Whole SecretDaeHun Nyang, JooSeok Song. 30-37
- On the Optimal Diffusion Layers with Practical Security against Differential and Linear CryptanalysisJu-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim. 38-52
- Non-linear Complexity of the Naor-Reingold Pseudo-random FunctionWilliam D. Banks, Frances Griffin, Daniel Lieman, Igor Shparlinski. 53-59
- Relationships between Bent Functions and Complementary Plateaued FunctionsYuliang Zheng, Xian-Mo Zhang. 60-75
- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash FunctionsTakeshi Koshiba. 76-81
- Over F::p:: vs. over F::2n:: and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve CryptosystemsYasuyuki Sakai. 82-101
- Speeding Up Elliptic Scalar Multiplication with PrecomputationChae Hoon Lim, Hyo Sun Hwang. 102-119
- Why Hierarchical Key Distribution Is Appropriate for Multicast NetworksChandana Gamage, Jussipekka Leiwo, Yuliang Zheng. 120-131
- Secure Selection ProtocolsKapali Viswanathan, Colin Boyd, Ed Dawson. 132-146
- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for ClientHyoungkyu Lee, Dongho Won, Kiwook Sohn, Hyoungkyu Yang. 147-155
- A 2-Pass Authentication and Key Agreement Protocol for Mobile CommunicationsKook-Heui Lee, Sang-Jae Moon, Won-Young Jeong, Tae-Geun Kim. 156-168
- Verfiable Secret Sharing and Time CapsulesJosef Pieprzyk, Eiji Okamoto. 169-183
- A New Approach to Robust Threshold RSA Signature SchemesReihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam. 184-196
- On Threshold RSA-Signing with no DealerShingo Miyazaki, Kouichi Sakurai, Moti Yung. 197-207
- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA SignatureHo-Sun Yoon, Heung-Youl Youm. 208-220
- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve CryptosystemsTetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto. 221-235
- A Security Design for a Wide-Area Distributed SystemJussipekka Leiwo, Christoph Hänle, Philip Homburg, Chandana Gamage, Andrew S. Tanenbaum. 236-256
- Self-Escrowed Public-Key InfrastructuresPascal Paillier, Moti Yung. 257-268
- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption SchemeMoonseog Seo, Kwangjo Kim. 269-277