Abstract is missing.
- Trends and Challenges for Securer Cryptography in PracticeHideki Imai. 1 [doi]
- Distinguishing Attacks on T-FunctionsSimon Künzli 0002, Pascal Junod, Willi Meier. 2-15 [doi]
- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data ComplexityFrederik Armknecht, Gwénolé Ars. 16-32 [doi]
- Equivalent Keys in HFE, C:::*:::, and VariationsChristopher Wolf, Bart Preneel. 33-49 [doi]
- A New Structural Attack for GPT and VariantsRaphael Overbeck. 50-63 [doi]
- A Family of Fast Syndrome Based Cryptographic Hash FunctionsDaniel Augot, Matthieu Finiasz, Nicolas Sendrier. 64-83 [doi]
- Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret SharingKun Peng, Colin Boyd, Ed Dawson. 84-98 [doi]
- Identity Based Delegation NetworkSherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu. 99-115 [doi]
- On Session Key Construction in Provably-Secure Key Establishment ProtocolsKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock. 116-131 [doi]
- On the Security of Probabilistic Multisignature Schemes and Their OptimalityYuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura. 132-150 [doi]
- Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group ManagersAggelos Kiayias, Moti Yung. 151-170 [doi]
- An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication AlgorithmMathieu Ciet, Francesco Sica. 171-182 [doi]
- Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-DecryptionSung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha. 183-195 [doi]
- Optimization of the MOVA Undeniable Signature SchemeJean Monnerat, Yvonne Anne Oswald, Serge Vaudenay. 196-209 [doi]
- Questionable Encryption and Its ApplicationsAdam Young, Moti Yung. 210-221 [doi]
- Twin RSAArjen K. Lenstra, Benjamin M. M. de Weger. 222-228 [doi]
- Security of Two-Party Identity-Based Key AgreementColin Boyd, Kim-Kwang Raymond Choo. 229-243 [doi]
- Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64bChanghoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee. 244-262 [doi]
- Advanced Slide Attacks Revisited: Realigning Slide on DESRaphael Chung-Wei Phan. 263-276 [doi]
- New Multiset Attacks on Rijndael with Large BlocksJorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan. 277-295 [doi]
- Paillier s Cryptosystem Modulo p:::2:::q and Its Applications to Trapdoor Commitment SchemesKatja Schmidt-Samoa, Tsuyoshi Takagi. 296-313 [doi]
- Homomorphic Cryptosystems Based on Subgroup Membership ProblemsKristian Gjøsteen. 314-327 [doi]