Abstract is missing.
- Practical Security in Public-Key CryptographyDavid Pointcheval. 1-17 [doi]
- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution DistancesBeomsik Song, Huaxiong Wang, Jennifer Seberry. 18-31 [doi]
- Truncated Differential Cryptanalysis of CamelliaSeonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon. 32-38 [doi]
- Improved Impossible Differential Cryptanalysis of Rijndael and CryptonJung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang. 39-49 [doi]
- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi DecodingSabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor. 50 [doi]
- An IND-CCA2 Public-Key Cryptosystem with Fast DecryptionJohannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi. 51-71 [doi]
- Improvement of Probabilistic Public Key Cryptosystems Using Discrete LogarithmDug-Hwan Choi, Seungbok Choi, Dongho Won. 72-80 [doi]
- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular SquaringMototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai. 81-102 [doi]
- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of OperationJaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi. 103-113 [doi]
- Decentralized Event Correlation for Intrusion DetectionChristopher Krügel, Thomas Toth, Clemens Kerer. 114-131 [doi]
- Enhancing the Security of CookiesVorapranee Khu-smith, Chris J. Mitchell. 132-145 [doi]
- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address ConfirmationYang-Seo Choi, Dong Il Seo, Sung Won Sohn. 146-159 [doi]
- Efficient Revocation Schemes for Secure MulticastHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang. 160-177 [doi]
- Binary Codes for Collusion-Secure FingerprintingGérard D. Cohen, Simon Litsyn, Gilles Zémor. 178-185 [doi]
- Copyright Protection of Object-Oriented SoftwareJaroslaw Pastuszak, Darek Michalek, Josef Pieprzyk. 186-199 [doi]
- Off-Line Authentication Using WatermarksHyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim. 200-213 [doi]
- Slide Attacks with a Known-Plaintext CryptanalysisSoichi Furuya. 214-225 [doi]
- Constructions of Cheating Immune Secret SharingJosef Pieprzyk, Xian-Mo Zhang. 226-243 [doi]
- Private Computation with Shared Randomness over Broadcast ChannelClemente Galdi, Pino Persiano. 244-257 [doi]
- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust RequirementsNicolás González-Deleito, Olivier Markowitch. 258-267 [doi]
- Practical Reasoning about Accountability in Electronic Commerce ProtocolsSupakorn Kungpisdan, Yongyuth Permpoontanalarp. 268-284 [doi]
- Content Extraction SignaturesRon Steinfeld, Laurence Bull, Yuliang Zheng. 285-304 [doi]
- New Signcryption Schemes Based on KCDSADae Hyun Yum, Pil Joong Lee. 305-317 [doi]
- An Efficient and Provably Secure Threshold Blind SignatureJinho Kim, Kwangjo Kim, Chulsoo Lee. 318-327 [doi]
- A Multi-signature Scheme with Signers Intentions Secure against Active AttacksKei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada. 328-340 [doi]
- A Distributed Light-Weight Authentication Model for Ad-hoc NetworksAndré Weimerskirch, Gilles Thonet. 341-354 [doi]
- Design of an Authentication Protocol for Gsm JavacardsStelvio Cimato. 355-368 [doi]
- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing EnvironmentRichard Au, Mark Looi, Paul Ashley, Loo Tang Seet. 369-381 [doi]
- Protecting General Flexible Itineraries of Mobile AgentsJoan Mir, Joan Borrell. 382-396 [doi]
- RSA Speedup with Residue Number System Immune against Hardware Fault CryptanalysisSung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon. 397-413 [doi]
- A Countermeasure against One Physical Cryptanalysis May Benefit Another AttackSung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon. 414-427 [doi]
- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel AttacksKatsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai. 428-439 [doi]
- DPA Countermeasure Based on the Masking Method Kouichi Itoh, Masahiko Takenaka, Naoya Torii. 440-456 [doi]