Abstract is missing.
- Linear Complexity and Related Complexity Measures for SequencesHarald Niederreiter. 1-17 [doi]
- Forensic ComputingXiang Li, Jennifer Seberry. 18-35 [doi]
- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of OperationPalash Sarkar. 36-51 [doi]
- Analysis of Non-fortuitous Predictive States of the RC4 Keystream GeneratorSouradyuti Paul, Bart Preneel. 52-67 [doi]
- Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEAHamdi Murat Yildirim. 68-81 [doi]
- Impossible Differential Cryptanalysis for Block Cipher StructuresJongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee. 82-96 [doi]
- Impossible Differential Attack on 30-Round SHACAL-2Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee. 97-106 [doi]
- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract)Kishan Chand Gupta, Palash Sarkar. 107-120 [doi]
- Improved Cost Function in the Design of Boolean Functions Satisfying Multiple CriteriaSelçuk Kavut, Melek D. Yücel. 121-134 [doi]
- On Multiplicative Linear Secret Sharing SchemesVentzislav Nikov, Svetla Nikova, Bart Preneel. 135-147 [doi]
- A New (2, n)-Visual Threshold Scheme for Color ImagesAvishek Adhikari, Somnath Sikdar. 148-161 [doi]
- On the Power of Computational Secret SharingV. Vinod, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim. 162-176 [doi]
- Identity-Based BroadcastingYi Mu, Willy Susilo, Yan-Xia Lin. 177-190 [doi]
- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear PairingsFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo. 191-204 [doi]
- Extending Joux s Protocol to Multi Party Key Agreement (Extended Abstract)Rana Barua, Ratna Dutta, Palash Sarkar. 205-217 [doi]
- Public Key Cryptosystems Based on Free Partially Commutative Monoids and GroupsP. J. Abisha, D. G. Thomas, K. G. Subramanian. 218-227 [doi]
- Prime Numbers of Diffie-Hellman Groups for IKE-MODPIkkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim. 228-234 [doi]
- Polynomial Equivalence Problems and Applications to Multivariate CryptosystemsFrançoise Levy-dit-Vehel, Ludovic Perret. 235-251 [doi]
- Security Analysis of Several Group Signature SchemesGuilin Wang. 252-265 [doi]
- Forking Lemmas for Ring Signature SchemesJavier Herranz, Germán Sáez. 266-279 [doi]
- Practical Mental Poker Without a TTP Based on Homomorphic EncryptionJordi Castellà-Roca, Josep Domingo-Ferrer, Andreu Riera, Joan Borrell. 280-294 [doi]
- Lightweight Mobile Credit-Card Payment ProtocolSupakorn Kungpisdan, Bala Srinivasan, Phu Dung Le. 295-308 [doi]
- On the Construction of Prime Order Elliptic CurvesElisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis. 309-322 [doi]
- Counting Points on an Abelian Variety over a Finite FieldFarzali A. Izadi, V. Kumar Murty. 323-333 [doi]
- Side Channel Attack on Ha-Moon s Countermeasure of Randomized Signed Scalar MultiplicationKatsuyuki Okeya, Dong-Guk Han. 334-348 [doi]
- Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p:::m:::)Guido Bertoni, Jorge Guajardo, Gerardo Orlando. 349-362 [doi]
- Cryptanalysis of Block Based Spatial Domain Watermarking SchemesTanmoy Kanti Das. 363-374 [doi]
- More Efficient Password Authenticated Key Exchange Based on RSADuncan S. Wong, Agnes Hui Chan, Feng Zhu. 375-387 [doi]
- A Password-Based Authenticator: Security Proof and ApplicationsYvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague. 388-401 [doi]
- Stronger Security Bounds for OMAC, TMAC, and XCBCTetsu Iwata, Kaoru Kurosawa. 402-415 [doi]
- Progressive Verification: The Case of Message Authentication: (Extended Abstract)Marc Fischlin. 416-429 [doi]