Abstract is missing.
- Cryptographic Functions and Design Criteria for Block CiphersAnne Canteaut. 1-16 [doi]
- Mobile Agent Route Protection through Hash-Based MechanismsJosep Domingo-Ferrer. 17-29 [doi]
- A New Anonymous Fingerprinting Scheme with High Enciphering RateMinoru Kuribayashi, Hatsukazu Tanaka. 30-39 [doi]
- A Parallel Algorithm for Extending Cryptographic Hash FunctionsPalash Sarkar, Paul J. Schellenberg. 40-49 [doi]
- Incremental Hash Function Based on Pair Chaining & Modular Arithmetic CombiningBok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah. 50-61 [doi]
- Multiples of Primitive Polynomials over GF(2)Kishan Chand Gupta, Subhamoy Maitra. 62-72 [doi]
- Fast Generation of Cubic Irreducible Polynomials for XTRJaemoon Kim, Ikkwon Yie, Seung Ik Oh, Hyung-Don Kim, Jado Ryu. 73-78 [doi]
- Cheating Prevention in Secret Sharing over GF(p:::t:::)Josef Pieprzyk, Xian-Mo Zhang. 79-90 [doi]
- An Application of Sieve Methods to Elliptic CurvesS. Ali Miri, V. Kumar Murty. 91-98 [doi]
- Elliptic Curves of Prime Order over Optimal Extension Fields for Use in CryptographyHarald Baier. 99-107 [doi]
- A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve CryptographyMathieu Ciet, Jean-Jacques Quisquater, Francesco Sica. 108-116 [doi]
- Frameproof and IPP CodesPalash Sarkar, Douglas R. Stinson. 117-126 [doi]
- Linear Authentication Codes: Bounds and ConstructionsReihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing. 127-135 [doi]
- Selective Receipt in Certified E-mailSteve Kremer, Olivier Markowitch. 136-148 [doi]
- Spatial Domain Digital Watermarking with Buyer AuthenticationSubhamoy Maitra, Dipti Prasad Mukherjee. 149-161 [doi]
- Efficient Public Auction with One-Time Registration and Public VerifiabilityByoungcheon Lee, Kwangjo Kim, Joongsoo Ma. 162-174 [doi]
- An Analysis of Integrity Services in ProtocolsKapali Viswanathan, Colin Boyd, Ed Dawson. 175-187 [doi]
- Cryptanalysis of the Nonlinear FeedForward GeneratorS. S. Bedi, N. Rajesh Pillai. 188-194 [doi]
- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite DegreeMarkus Maurer, Alfred Menezes, Edlyn Teske. 195-213 [doi]
- Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric CryptosystemAmr M. Youssef, Guang Gong. 214-222 [doi]
- Robust and Secure BroadcastingYi Mu, Vijay Varadharajan. 223-231 [doi]
- Toward Optimal Player Weights in Secure Distributed ProtocolsK. Srinathan, C. Pandu Rangan, V. Kamakoti. 232-241 [doi]
- Autocorrelation Properties of Correlation Immune Boolean FunctionsSubhamoy Maitra. 242-253 [doi]
- On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special MatricesMaria Fedorova, Yuriy Tarannikov. 254-266 [doi]
- A Twin Algorithm for Efficient Generation of Digital SignaturesD. Ramesh. 267-274 [doi]
- Efficient on the Fly Signature Schemes Based on Integer FactoringTakeshi Okamoto, Mitsuru Tada, Atsuko Miyaji. 275-286 [doi]
- Clock-Controlled Shift Registers and Generalized Geffe Key-Stream GeneratorAlexander Kholosha. 287-296 [doi]
- Efficient Software Implementation of Linear Feedback Shift RegistersSandeepan Chowdhury, Subhamoy Maitra. 297-307 [doi]
- Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim. 308-315 [doi]
- Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher CryptographyShujun Li, Xuanqin Mou, Cai Yuanlong. 316-329 [doi]
- Re-dividing Complexity between Algorithms and KeysGideon Samid. 330-338 [doi]
- A Tool Box of Cryptographic Functions Related to the Diffie-Hellman FunctionEike Kiltz. 339-350 [doi]