Abstract is missing.
- RFID Privacy Based on Public-Key CryptographySerge Vaudenay. 1-6 [doi]
- Generic Attacks on Symmetric CiphersPalash Sarkar. 7 [doi]
- Improved Collision Attack on the Hash Function Proposed at PKC 98Florian Mendel, Norbert Pramstaller, Christian Rechberger. 8-21 [doi]
- Hashing with PolynomialsVladimir Shpilrain. 22-28 [doi]
- Birthday Paradox for Multi-collisionsKazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota. 29-40 [doi]
- New Variant of the Self-Shrinking Generator and Its Cryptographic PropertiesKu-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong. 41-50 [doi]
- On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block CipherBon Wook Koo, Hwan Seok Jang, Jung Hwan Song. 51-64 [doi]
- On Algebraic Immunity and AnnihilatorsXian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng. 65-80 [doi]
- High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder TheoremBonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee. 81-93 [doi]
- A High-Speed Square Root Algorithm in Extension FieldsHidehiro Katou, Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa. 94-106 [doi]
- The Smallest ARIA Module with 16-Bit ArchitectureSangwoon Yang, Jinsub Park, Younggap You. 107-117 [doi]
- A Simpler Sieving Device: Combining ECM and TWIRLWilli Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt. 118-135 [doi]
- Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated AttacksZonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen. 136-154 [doi]
- A Time-Frame Based Trust Model for P2P SystemsJunsheng Chang, Huaimin Wang, Gang Yin. 155-165 [doi]
- Spatial Context in Role-Based Access ControlHong Zhang, Yeping He, Zhiguo Shi. 166-178 [doi]
- An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc NetworksJongoh Choi, Si-Ho Cha, JooSeok Song. 179-193 [doi]
- Mobile RFID Applications and Security ChallengesDivyan M. Konidala, Kwangjo Kim. 194-205 [doi]
- An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence TimeYoon Ho Choi, Jong Ho Park, Sang-Kon Kim, Seung-Woo Seo, Yu Kang, Jin Gi Choe, Ho-Kun Moon, Myung-Soo Rhee. 206-221 [doi]
- A Copy Protection Technique Using Multi-level Error CodingChen-Yin Liao, Jen-Wei Yeh, Ming-Seng Kao. 222-232 [doi]
- Digital Rights Management with Right Delegation for Home NetworksHeeyoul Kim, YounHo Lee, Byungchun Chung, Hyunsoo Yoon, Jaewon Lee, KyungIm Jung. 233-245 [doi]
- Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVMKang Ryoung Park, Min Cheol Whang, Joa Sang Lim, Yongjoo Cho. 246-256 [doi]
- Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård ConstructionDaniel Joscák, Jirí Tuma. 257-266 [doi]
- Cryptanalysis of T-Function-Based Hash FunctionsFrédéric Muller, Thomas Peyrin. 267-285 [doi]
- Collision Search Attack for 53-Step HAS-160Hong-Su Cho, Sangwoo Park, Soo Hak Sung, Aaram Yun. 286-295 [doi]
- Klein Bottle Routing: An Alternative to Onion Routing and Mix NetworkKun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson. 296-309 [doi]
- New Constructions of Constant Size Ciphertext HIBE Without Random OracleSanjit Chatterjee, Palash Sarkar. 310-327 [doi]
- A New Proxy Signature Scheme Providing Self-delegationYounHo Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon. 328-342 [doi]
- Extended Sanitizable SignaturesMarek Klonowski, Anna Lauks. 343-355 [doi]