Abstract is missing.
- On the Security of Williams Based Public Key Encryption SchemeSiguna Müller. 1-18 [doi]
- Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKCKazukuni Kobara, Hideki Imai. 19-35 [doi]
- IND-CCA Public Key Schemes Equivalent to Factoring n=pqKaoru Kurosawa, Wakaha Ogata, Toshihiki Matsuo, Shuichi Makishima. 36-47 [doi]
- Identification, Signature and Signcryption Using High Order Residues Modulo an RSA CompositeYuliang Zheng. 48-63 [doi]
- On the Security of Lenstra s Variant of DSA without Long InversionsArjen K. Lenstra, Igor Shparlinski. 64-72 [doi]
- Fast Irreducibility and Subgroup Membership Testing in XTRArjen K. Lenstra, Eric R. Verheul. 73-86 [doi]
- A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption SchemesTakeshi Koshiba. 87-103 [doi]
- The Gap-Problems: A New Class of Problems for the Security of Cryptographic SchemesTatsuaki Okamoto, David Pointcheval. 104-118 [doi]
- A Generalisation, a Simplification and Some Applications of Paillier s Probabilistic Public-Key SystemIvan Damgård, Mads Jurik. 119-136 [doi]
- Marking: A Privacy Protecting Approach Against BlackmailingDennis Kügler, Holger Vogt. 137-152 [doi]
- Cryptoanalysis of Two Sparse Polynomial Based Public Key CryptosystemsFeng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu. 153-164 [doi]
- Cryptanalysis of PKP: A New ApproachÉliane Jaulmes, Antoine Joux. 165-172 [doi]
- Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing InfrastructuresHongjun Wu, Feng Bao, Robert H. Deng. 173-179 [doi]
- Loopholes in Two Public Key Cryptosystems Using the Modular GroupRainer Steinwandt. 180-189 [doi]
- Efficient Revocation in Group SignaturesEmmanuel Bresson, Jacques Stern. 190-206 [doi]
- A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic SharesWen-Guey Tzeng, Zhi-Jia Tzeng. 207-224 [doi]
- Efficient Asymmetric Self-Enforcement Scheme with Public TraceabilityHirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai. 225-239 [doi]
- Adaptive Security for the Additive-Sharing Based Proactive RSAYair Frankel, Philip D. MacKenzie, Moti Yung. 240-263 [doi]
- Robust Forward-Secure Signature Schemes with Proactive SecurityWen-Guey Tzeng, Zhi-Jia Tzeng. 264-276 [doi]
- Equitability in Retroactive Data Confiscation versus Proactive Key EscrowYvo Desmedt, Mike Burmester, Jennifer Seberry. 277-286 [doi]
- A PVSS as Hard as Discrete Log and Shareholder SeparabilityAdam Young, Moti Yung. 287-299 [doi]
- One Round Threshold Discrete-Log Key Generation without Private ChannelsPierre-Alain Fouque, Jacques Stern. 300-316 [doi]
- Remarks on Mix-Network Based on Permutation NetworksMasayuki Abe, Fumitaka Hoshino. 317-324 [doi]
- New Key Recovery in WAKE ProtocolChong Hee Kim, Pil Joong Lee. 325-338 [doi]
- Redundant Representation of Finite FieldsWilli Geiselmann, Harald Lukhaub. 339-352 [doi]
- Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve CryptographyMarc Joye, Christophe Tymen. 353-364 [doi]
- Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of MicrocontrollersJorge Guajardo, Rainer Blümel, Uwe Krieger, Christof Paar. 365-382 [doi]
- Secure Server-Aided Signature GenerationMarkus Jakobsson, Susanne Wetzel. 383-401 [doi]
- Efficient Long-Term Validation of Digital SignaturesArne Ansper, Ahto Buldas, Meelis Roos, Jan Willemson. 402-415 [doi]
- A Novel Systolic Architecture for Efficient RSA ImplementationNikos K. Moshopoulos, Kiamal Z. Pekmestzi. 416-421 [doi]