Abstract is missing.
- Abstract Models of Computation in CryptographyUeli M. Maurer. 1-12 [doi]
- Pairing-Based Cryptography at High Security LevelsNeal Koblitz, Alfred Menezes. 13-36 [doi]
- Improved Decoding of Interleaved AG CodesAndrew Brown, Lorenz Minder, Amin Shokrollahi. 37-46 [doi]
- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition CharacteristicsWoo Tae Kim, Se H. Kang, Eon Kyeong Joo. 47-58 [doi]
- A Trellis-Based Bound on (2, 1)-Separating CodesHans Georg Schaathun, Gérard D. Cohen. 59-67 [doi]
- Tessellation Based Multiple Description CodingCanhui Cai, Jing Chen. 68-77 [doi]
- Exploiting Coding Theory for Collision Attacks on SHA-1Norbert Pramstaller, Christian Rechberger, Vincent Rijmen. 78-95 [doi]
- Hash Based Digital Signature SchemesC. Dods, Nigel P. Smart, Martijn Stam. 96-115 [doi]
- A General Construction for Simultaneous Signing and EncryptingJohn Malone-Lee. 116-135 [doi]
- Non-interactive Designated Verifier Proofs and Undeniable SignaturesCaroline Kudla, Kenneth G. Paterson. 136-154 [doi]
- Partial Key Recovery Attacks on XCBC, TMAC and OMACChris J. Mitchell. 155-167 [doi]
- Domain Expansion of MACs: Alternative Uses of the FIL-MACUeli M. Maurer, Johan Sjödin. 168-185 [doi]
- Normality of Vectorial FunctionsAn Braeken, Christopher Wolf, Bart Preneel. 186-200 [doi]
- Related-Key Differential Attacks on Cobra-H64 and Cobra-H128Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon. 201-219 [doi]
- The Physically Observable Security of Signature SchemesAlexander W. Dent, John Malone-Lee. 220-232 [doi]
- On the Automatic Construction of Indistinguishable OperationsManuel Barbosa, Dan Page. 233-247 [doi]
- Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based MethodsMustapha Hedabou. 248-261 [doi]
- Complexity Estimates for the F::4:: Attack on the Perturbed Matsumoto-Imai CryptosystemJintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin. 262-277 [doi]
- An Algebraic Framework for Cipher EmbeddingsCarlos Cid, Sean Murphy, Matthew J. B. Robshaw. 278-289 [doi]
- Probabilistic Algebraic AttacksAn Braeken, Bart Preneel. 290-303 [doi]
- Unconditionally Secure Information Authentication in Presence of ErasuresGoce Jakimoski. 304-321 [doi]
- Generalized Strong Extractors and Deterministic Privacy AmplificationRobert König, Ueli M. Maurer. 322-339 [doi]
- On Threshold Self-healing Key Distribution SchemesGermán Sáez. 340-354 [doi]
- Concrete Security of the Blum-Blum-Shub Pseudorandom GeneratorAndrey Sidorenko, Berry Schoenmakers. 355-375 [doi]
- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, RevisitedK. Bentahar. 376-391 [doi]
- Pairings on Elliptic Curves over Finite Commutative RingsSteven D. Galbraith, James F. McKee. 392-409 [doi]
- A Key Encapsulation Mechanism for NTRUMartijn Stam. 410-427 [doi]
- Efficient Identity-Based Key Encapsulation to Multiple PartiesManuel Barbosa, Pooya Farshim. 428-441 [doi]
- Security Proof of Sakai-Kasahara s Identity-Based Encryption SchemeLiqun Chen, Zhaohui Cheng. 442-459 [doi]