Abstract is missing.
- A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block StructuresJu-Sung Kang, Seongtaek Chee, Choonsik Park. 1-13 [doi]
- On the Strength of KASUMI without FL Functions against Higher Order Differential AttackHidema Tanaka, Chikashi Ishii, Toshinobu Kaneko. 14-21 [doi]
- On MISTY1 Higher Order Differential CryptanalysisSteve Babbage, Laurent Frisch. 22-36 [doi]
- Difference Distribution Attack on DONUT and Improved DONUTDong Hyeon Cheon, Seokhie Hong, Sangjin Lee, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon. 37-48 [doi]
- New Results on Correlation ImmunityYuliang Zheng, Xian-Mo Zhang. 49-63 [doi]
- Elliptic Curves and Resilient FunctionsJung Hee Cheon, Seongtaek Chee. 64-72 [doi]
- Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR ConstructionTed Krovetz, Phillip Rogaway. 73-89 [doi]
- Characterization of Elliptic Curve Traces under FR-ReductionAtsuko Miyaji, Masaki Nakabayashi, Shunzo Takano. 90-108 [doi]
- A Multi-party Optimistic Non-repudiation ProtocolOlivier Markowitch, Steve Kremer. 109-122 [doi]
- Secure Matchmaking ProtocolByoungcheon Lee, Kwangjo Kim. 123-134 [doi]
- An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSATakeru Miyazaki. 135-149 [doi]
- Efficient and Secure Member Deletion in Group Signature SchemesHyun-Jeong Kim, Jong In Lim, Dong-Hoon Lee. 150-161 [doi]
- An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital GoodsFeng Bao, Robert H. Deng, Peirong Feng. 162-170 [doi]
- An Internet Anonymous Auction SchemeYi Mu, Vijay Varadharajan. 171-182 [doi]
- Efficient Sealed-Bid Auction Using Hash ChainKoutarou Suzuki, Kunio Kobayashi, Hikaru Morita. 183-191 [doi]
- Micropayments for Wireless CommunicationsDongGook Park, Colin Boyd, Ed Dawson. 192-205 [doi]
- Cryptographic Applications of Sparse Polynomials over Finite RingsWilliam D. Banks, Daniel Lieman, Igor Shparlinski, Van Thuong To. 206-220 [doi]
- Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of RedistributorsChanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho Won. 221-234 [doi]
- Hash to the Rescue: Space Minimization for PKI DirectoriesAdam Young, Moti Yung. 235-245 [doi]
- A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security ManagementJae-Seung Lee, Sang-Choon Kim, Seung Won Sohn. 246-260 [doi]