Abstract is missing.
- New Semantically Secure Public-Key Cryptosystems from the RSA-PrimitiveKouichi Sakurai, Tsuyoshi Takagi. 1-16 [doi]
- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length MessagesJean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen. 17-33 [doi]
- On Sufficient Randomness for Secure Public-Key CryptosystemsTakeshi Koshiba. 34-47 [doi]
- Multi-recipient Public-Key Encryption with Shortened CiphertextKaoru Kurosawa. 48-63 [doi]
- Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication CodeGoichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai. 64-79 [doi]
- Formal Proofs for the Security of SigncryptionJoonsang Baek, Ron Steinfeld, Yuliang Zheng. 80-98 [doi]
- A Provably Secure Restrictive Partially Blind Signature SchemeGreg Maitland, Colin Boyd. 99-114 [doi]
- M+1-st Price Auction Using Homomorphic EncryptionMasayuki Abe, Koutarou Suzuki. 115-124 [doi]
- Client/Server Tradeoffs for Online ElectionsIvan Damgård, Mads Jurik. 125-140 [doi]
- Self-tallying Elections and Perfect Ballot SecrecyAggelos Kiayias, Moti Yung. 141-158 [doi]
- Efficient 1-Out-n Oblivious Transfer SchemesWen-Guey Tzeng. 159-171 [doi]
- Linear Code Implies Public-Key Traitor TracingKaoru Kurosawa, Takuya Yoshida. 172-187 [doi]
- Design and Security Analysis of Anonymous Group Identification ProtocolsChan H. Lee, Xiaotie Deng, Huafei Zhu. 188-198 [doi]
- On the Security of the Threshold Scheme Based on the Chinese Remainder TheoremMichaël Quisquater, Bart Preneel, Joos Vandewalle. 199-210 [doi]
- Solving Underdefined Systems of Multivariate Quadratic EquationsNicolas Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier. 211-227 [doi]
- Selective Forgery of RSA Signatures with Fixed-Pattern PaddingArjen K. Lenstra, Igor Shparlinski. 228-236 [doi]
- New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000Kazukuni Kobara, Hideki Imai. 237-251 [doi]
- SPA-Based Adaptive Chosen-Ciphertext Attack on RSA ImplementationRoman Novak. 252-262 [doi]
- A Combined Timing and Power AttackWerner Schindler. 263-279 [doi]
- A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel AttacksTetsuya Izu, Tsuyoshi Takagi. 280-296 [doi]
- New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status ReportBart Preneel. 297-309 [doi]
- An Improved Method of Multiplication on Certain Elliptic CurvesYoung-Ho Park, Sangho Oh, Sangjin Lee, Jongin Lim, Maenghee Sung. 310-322 [doi]
- An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic CurvesYoung-Ho Park, Sangtae Jeong, Chang-Han Kim, Jongin Lim. 323-334 [doi]
- Weierstraß Elliptic Curves and Side-Channel AttacksEric Brier, Marc Joye. 335-345 [doi]
- One-Way Cross-Trees and Their ApplicationsMarc Joye, Sung-Ming Yen. 346-356 [doi]
- RSA Key Generation with Verifiable RandomnessAri Juels, Jorge Guajardo. 357-374 [doi]
- New Minimal Modified Radix-r Representation with Applications to Smart CardsMarc Joye, Sung-Ming Yen. 375-384 [doi]