Abstract is missing.
- A General Theory of Codes, II: Paradigms and HomomorphismsG. R. Blakley, I. Borosh. 1-31
- Improving the Higher Order Differential Attack and Cryptanalysis of the ::::KN:::: CipherTakeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko. 32-42
- An Optimised Linear Attack on Pseudorandom Generators Using a Non linear CombinerHidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko. 43-54
- Cryptanalysis of Message Authentication CodesBart Preneel. 55-65
- The Least Witness of a Composite NumberR. Balasubramanian, S. V. Nagaraj. 66-74
- Fast Algorithm for Finding a Small Root of a Quadratic Modular EquationHidenori Kuwadako, Hatsukazu Tanaka. 75-81
- Modified Finite Automata Public Key CryptosystemFeng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi. 82-95
- Modified ElGamal CryptosystemDaisuke Nakamura, Kunikatsu Kobayashi. 96-108
- Remarks on Blind DecryptionKazuo Ohta. 109-115
- High-Speed CryptographyGeorge I. Davida, René Peralta. 116-120
- Secure Applications of Low-Entropy KeysJohn Kelsey, Bruce Schneier, Chris Hall, David Wagner. 121-134
- A Key Escrow System of the RSA CryptosystemYoshiki Sameshima. 135-146
- A Key Escrow System with Protecting User s Privacy by Blind DecodingKouichi Sakurai, Yoshinori Yamani, Shingo Miyazaki, Tohru Inoue. 147-157
- Some Recent Research Aspects of Threshold CryptographyYvo Desmedt. 158-173
- A High-Speed Small RSA Encryption LSI with Low Power DissipationAkashi Satoh, Y. Kobayashi, H. Niijima, Nobuyuki Ooba, Seiji Munetoh, S. Sone. 174-187
- The Case for a Secure Multi-Application Smart Card Operating SystemConstantinos Markantonakis. 188-197
- An Augmented Family of Cryptographic Parity CircuitsKenji Koyama, Routo Terada. 198-208
- A New Byte-Oriented Block CipherXun Yi, Kwok-Yan Lam, Shi Xin Cheng, Xiao-Hu You. 209-220
- Practice-Oriented Provable-SecurityMihir Bellare. 221-231
- A Framework for the Management of Information SecurityJussipekka Leiwo, Yuliang Zheng. 232-245
- Specifying Security in a Composite SystemJean-Marie Kabasele-Tenday. 246-255
- On Rough Sets and Inference AnalysisKan Zhang. 256-265
- Arbitrated Unconditionally Secure Authentication Scheme with Multi-sendersTzonelih Hwang, Chih-Hung Wang. 266-272
- Group Signatures for Hierarchical MultigroupsSeungjoo Kim, Sangjoon Park, Dongho Won. 273-281
- Threshold Proxy Signature SchemesKan Zhang. 282-290
- Signcryption and Its Applications in Efficient Public Key SolutionsYuliang Zheng. 291-312
- A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital SignatureKhanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. 313-320
- An Incremental Payment Method for Internet Based Streaming Real-Time MediaAndreas Fuchsberger. 321-327
- A New Identity-Based Key Exchange Protocol Minimizing Computation and CommunicationShahrokh Saeednia, Reihaneh Safavi-Naini. 328-334
- The Application of ID-Based Key Distribution Systems to an Elliptic CurveHisao Sakazaki, Eiji Okamoto, Masahiro Mambo. 335-344
- On Reconciliation of Discrepant Sequences Shared through Quantum Mechanical ChannelsKouichi Yamazaki, Masao Osaki, Osamu Hirota. 345-356