Abstract is missing.
- IntroductionYuliang Zheng. 1-18 [doi]
- Security for Signcryption: The Two-User ModelJee Hea An, Tal Rabin. 21-42 [doi]
- Security for Signcryption: The Multi-User ModelJoonsang Baek, Ron Steinfeld. 43-53 [doi]
- Signcryption Schemes Based on the Diffie-Hellman ProblemPaulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater. 57-69 [doi]
- Signcryption Schemes Based on Bilinear MapsPaulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater. 71-97 [doi]
- Signcryption Schemes Based on the RSA ProblemAlexander W. Dent, John Malone-Lee. 99-117 [doi]
- Hybrid SigncryptionTor E. Bjørstad. 121-147 [doi]
- Concealment and Its Applications to Authenticated EncryptionYevgeniy Dodis. 149-173 [doi]
- Parallel SigncryptionJosef Pieprzyk, David Pointcheval. 175-192 [doi]
- Identity-Based SigncryptionXavier Boyen. 195-216 [doi]
- Key Establishment Using Signcryption TechniquesAlexander W. Dent. 217-240 [doi]
- Applications of SigncryptionYang Cui, Goichiro Hanaoka. 241-256 [doi]