Abstract is missing.
- Abelian Varieties and CryptographyV. Kumar Murty. 1-12 [doi]
- Proof of a Conjecture on the Joint Linear Complexity Profile of MultisequencesHarald Niederreiter, Li-Ping Wang. 13-22 [doi]
- Period of Streamcipher ::::Edon80::::Jin Hong. 23-34 [doi]
- On the Algebraic Immunity of Symmetric Boolean FunctionsAn Braeken, Bart Preneel. 35-48 [doi]
- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA AttacksClaude Carlet. 49-62 [doi]
- How to Construct Universal One-Way Hash Functions of Order ::::r::::Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee. 63-76 [doi]
- Towards Optimal Double-Length Hash FunctionsMridul Nandi. 77-89 [doi]
- Near Optimal Algorithms for Solving Differential Equations of Addition with Batch QueriesSouradyuti Paul, Bart Preneel. 90-103 [doi]
- Design Principles for Combiners with MemoryFrederik Armknecht, Matthias Krause, Dirk Stegemann. 104-117 [doi]
- Cryptanalysis of the Quadratic GeneratorDomingo Gómez, Jaime Gutierrez, Álvar Ibeas. 118-129 [doi]
- Attack the DragonHåkan Englund, Alexander Maximov. 130-142 [doi]
- Two Algebraic Attacks Against the F-FCSRs Using the IV ModeThierry P. Berger, Marine Minier. 143-154 [doi]
- Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation AttacksMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai. 155-168 [doi]
- TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEYJin Hong, Woo-Hwan Kim. 169-182 [doi]
- Time-Memory Trade-Offs: False Alarm Detection Using CheckpointsGildas Avoine, Pascal Junod, Philippe Oechslin. 183-196 [doi]
- Cryptanalysis of Barni et al. Watermarking SchemeTanmoy Kanti Das, Jianying Zhou. 197-208 [doi]
- Completion Attacks and Weak Keys of Oleshchuk s Public Key CryptosystemHeiko Stamer. 209-220 [doi]
- An Optimal Subset Cover for Broadcast EncryptionSarang Aravamuthan, Sachin Lodha. 221-231 [doi]
- MaTRU: A New NTRU-Based CryptosystemMichael Coglianese, Bok-Min Goi. 232-243 [doi]
- Anonymous Password-Based Authenticated Key ExchangeDuong Viet, Akihiro Yamamura, Hidema Tanaka. 244-257 [doi]
- Faster Pairings Using an Elliptic Curve with an Efficient EndomorphismMichael Scott. 258-269 [doi]
- Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption SchemeMototsugu Nishioka. 270-282 [doi]
- Short Undeniable Signatures Without Random Oracles: The Missing LinkFabien Laguillaumie, Damien Vergnaud. 283-296 [doi]
- Short Threshold Signature Schemes Without Random OraclesHong Wang, Yuqing Zhang, Dengguo Feng. 297-310 [doi]
- Attacking an Asynchronous Multi-party Contract Signing ProtocolJose Antonio Onieva, Jianying Zhou, Javier Lopez. 311-321 [doi]
- Fairness and Correctness in Case of a Premature AbortJens-Matthias Bohli, Jörn Müller-Quade, Stefan Röhrich. 322-331 [doi]
- Short E-CashMan Ho Au, Sherman S. M. Chow, Willy Susilo. 332-346 [doi]
- A Universally Composable Scheme for Electronic CashMårten Trolin. 347-360 [doi]
- Energy-Privacy Trade-Offs in VLSI ComputationsAkhilesh Tyagi. 361-374 [doi]
- Modified Serial Multipliers for Type-IV Gaussian Normal BasesChang-Han Kim, Yongtae Kim, Nam Su Chang, IlWhan Park. 375-388 [doi]
- Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd CharacteristicChristophe Nègre. 389-402 [doi]
- SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2Tanja Lange, Pradeep Kumar Mishra. 403-416 [doi]