Abstract is missing.
- Binary Tree Encryption: Constructions and ApplicationsJonathan Katz. 1-11 [doi]
- A Separable Threshold Ring Signature SchemeJoseph K. Liu, Victor K. Wei, Duncan S. Wong. 12-26 [doi]
- On the Security of a Group Signature Scheme with Forward SecurityGuilin Wang. 27-39 [doi]
- An Efficient Strong Designated Verifier Signature SchemeShahrokh Saeednia, Steve Kremer, Olivier Markowitch. 40-54 [doi]
- Sound Computational Interpretation of Formal Encryption with Composed KeysPeeter Laud, Ricardo Corin. 55-66 [doi]
- On the Security of a New Variant of OMACTetsu Iwata, Kaoru Kurosawa. 67-78 [doi]
- New Methods to Construct Cheating Immune FunctionsWen Ping Ma, Moon Ho Lee. 79-86 [doi]
- Yet Another Definition of Weak Collision Resistance and Its AnalysisShoichi Hirose. 87-96 [doi]
- Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2YoungJu Choie, Eunjeong Lee. 97-111 [doi]
- A General Expansion Method Using Efficient EndomorphismsTae-Jun Park, Mun-Kyu Lee, E-yong Kim, Kunsoo Park. 112-126 [doi]
- Design of Bit Parallel Multiplier with Lower Time ComplexitySeon Ok Lee, Seok Won Jung, Chang-Han Kim, Janghong Yoon, Jae-Young Koh, Daeho Kim. 127-139 [doi]
- Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel AttacksJoong Chul Yoon, Seok Won Jung, Sungwoo Lee. 139-151 [doi]
- Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius ExpansionTae-Jun Park, Mun-Kyu Lee, Kunsoo Park. 152-165 [doi]
- Adaptive Protocol for Entity Authentication and Key Agreement in Mobile NetworksMuxiang Zhang. 166-183 [doi]
- Extended Role Based Access Control and Procedural RestrictionsWook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, Jin-Seok Lee. 184-196 [doi]
- Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation SystemYuan Zhang, Moon-Jung Chung, Hyun Kim. 197-214 [doi]
- Secure Double Auction Protocols with Full Privacy ProtectionChangjie Wang, Ho-Fung Leung, YuMin Wang. 215-229 [doi]
- Sealed-Bid Auctions with Efficient BidsToru Nakanishi, Daisuke Yamamoto, Yuji Sugiyama. 230-244 [doi]
- Providing Receipt-Freeness in Mixnet-Based Voting ProtocolsByoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo. 245-258 [doi]
- Receipt-Free Electronic Auction Schemes Using Homomorphic EncryptionXiaofeng Chen, Byoungcheon Lee, Kwangjo Kim. 259-273 [doi]
- Software Watermarking Through Register Allocation: Implementation, Analysis, and AttacksGinger Myles, Christian S. Collberg. 274-293 [doi]
- Analysis of the Bounds for Linear Block Codes in Watermark ChannelLimin Gu, Jiwu Huang, Zewen Chen. 294-304 [doi]
- Security Analysis of Some Proxy SignaturesGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng. 305-319 [doi]
- A More Secure and Efficacious TTS Signature SchemeJiun-Ming Chen, Bo-Yin Yang. 320-338 [doi]
- An Efficient Revocation Algorithm in Group SignaturesZewen Chen, Jilin Wang, YuMin Wang, Jiwu Huang, Daren Huang. 339-351 [doi]
- Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext AuthenticitySherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow. 352-369 [doi]
- Group Oriented Cryptosystems Based on Linear Access StructuresWen Ping Ma, Moon Ho Lee. 370-376 [doi]
- A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with CheatersRaylin Tso, Ying Miao, Eiji Okamoto. 377-385 [doi]
- Non-interactive Deniable Ring AuthenticationWilly Susilo, Yi Mu. 386-401 [doi]
- Differential Cryptanalysis of TEA and XTEASeokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee. 402-417 [doi]
- A Complete Divide and Conquer Attack on the Alpha1 Stream CipherKevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson. 418-431 [doi]
- New Block Cipher: ARIADaesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong. 432-445 [doi]
- Truncated Differential Attacks on 8-Round CRYPTONJongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang. 446-456 [doi]