Abstract is missing.
- The Correlation of a Boolean Function with Its VariablesDingyi Pei, Wenliang Qin. 1-8 [doi]
- On Choice of Connection-Polynominals for LFSR-Based Stream CiphersJambunathan K. 9-18 [doi]
- On Resilient Boolean Functions with Maximal Possible NonlinearityYuriy Tarannikov. 19-30 [doi]
- Decimation Attack of Stream CiphersEric Filiol. 31-42 [doi]
- Cryptanalysis of the A5/1 GSM Stream CipherEli Biham, Orr Dunkelman. 43-51 [doi]
- On Bias Estimation in Linear CryptanalysisAli Aydin Selçuk. 52-66 [doi]
- On the Incomparability of Entropy and Marginal Guesswork in Brute-Force AttacksJohn O. Pliam. 67-79 [doi]
- Improved Impossible Differentials on TwofishEli Biham, Vladimir Furman. 80-92 [doi]
- An Online, Transferable E-Cash Payment SystemR. Sai Anand, C. E. Veni Madhavan. 93-103 [doi]
- Anonymity Control in Multi-bank E-Cash SystemIk Rae Jeong, Dong-Hoon Lee. 104-116 [doi]
- Efficient Asynchronous Secure Multiparty Distributed ComputationK. Srinathan, C. Pandu Rangan. 117-129 [doi]
- Tolerating Generalized Mobile Adversaries in Secure Multiparty ComputationK. Srinathan, C. Pandu Rangan. 130-142 [doi]
- Codes Identifying Bad Signature in BatchesJaroslaw Pastuszak, Josef Pieprzyk, Jennifer Seberry. 143-154 [doi]
- Distributed SigncryptionYi Mu, Vijay Varadharajan. 155-164 [doi]
- Fail-Stop Signature for Long MessagesReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang. 165-177 [doi]
- Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing AttackKatsuyuki Okeya, Kouichi Sakurai. 178-190 [doi]
- Efficient Construction of Cryptographically Strong Elliptic CurvesJohannes Buchmann, Harald Baier. 191-202 [doi]
- High-Speed Software Multiplication in F::2m::Julio López, Ricardo Dahab. 203-212 [doi]
- On Efficient Normal Basis MultiplicationArash Reyhani-Masoleh, M. Anwarul Hasan. 213-224 [doi]
- Symmetrically Private Information RetrievalSanjeev Kumar Mishra, Palash Sarkar. 225-236 [doi]
- Two-Pass Authenticated Key Arrangement Protocol with Key ConfirmationBoyeon Song, Kwangjo Kim. 237-249 [doi]
- Anonymous Traceability Schemes with Unconditional SecurityReihaneh Safavi-Naini, Yejing Wang. 250-261 [doi]
- New Block Cipher DONUT Using Pairwise Perfect DecorrelationDong Hyeon Cheon, Sangjin Lee, Jong In Lim, Sung Jae Lee. 262-270 [doi]
- Generating RSA Keys on a Handheld Using an Untrusted ServerDan Boneh, Nagendra Modadugu, Michael Kim. 271-282 [doi]
- A Generalized Takagi-Cryptosystem with a modulus of the form ::::p:::r:::q:::s:::::::Seongan Lim, Seungjoo Kim, Ikkwon Yie, Hongsub Lee. 283-294 [doi]