Abstract is missing.
- Efficient Construction of (Distributed) Verifiable Random FunctionsYevgeniy Dodis. 1-17 [doi]
- An Identity-Based Signature from Gap Diffie-Hellman GroupsJae Choon Cha, Jung Hee Cheon. 18-30 [doi]
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature SchemeAlexandra Boldyreva. 31-46 [doi]
- An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext AttackPhilip D. MacKenzie. 47-61 [doi]
- On the Bit Security of NTRUEncryptMats Näslund, Igor Shparlinski, William Whyte. 62-70 [doi]
- Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext AttacksYodai Watanabe, Junji Shikata, Hideki Imai. 71-84 [doi]
- Randomness Re-use in Multi-recipient Encryption SchemeasMihir Bellare, Alexandra Boldyreva, Jessica Staddon. 85-99 [doi]
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext AttackYevgeniy Dodis, Nelly Fazio. 100-115 [doi]
- The Cramer-Shoup Strong-RSASignature Scheme RevisitedMarc Fischlin. 116-129 [doi]
- Strong Key-Insulated Signature SchemesYevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung. 130-144 [doi]
- A Verifiable Secret Shuffle of Homomorphic EncryptionsJens Groth. 145-160 [doi]
- Round-Optimal Contributory Conference Key AgreementColin Boyd, Juan Manuel González Nieto. 161-174 [doi]
- Security Analysis of the MOR CryptosystemChristian Tobias. 175-186 [doi]
- A Practical Attack on Some Braid Group Based Cryptographic PrimitivesDennis Hofheinz, Rainer Steinwandt. 187-198 [doi]
- A Refined Power-Analysis Attack on Elliptic Curve CryptosystemsLouis Goubin. 199-210 [doi]
- Validation of Elliptic Curve Public KeysAdrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone. 211-223 [doi]
- Exceptional Procedure Attack on Elliptic Curve CryptosystemsTetsuya Izu, Tsuyoshi Takagi. 224-239 [doi]
- On Montgomery-Like Representationsfor Elliptic Curves over GF(2:::k:::)Martijn Stam. 240-253 [doi]
- A Dedicated Sieving HardwareWilli Geiselmann, Rainer Steinwandt. 254-266 [doi]
- A Fast and Secure Implementation of SflashMehdi-Laurent Akkar, Nicolas Courtois, Romain Duteuil, Louis Goubin. 267-278 [doi]
- A Practical Public Key Cryptosystem from Paillier and Rabin SchemesDavid Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar. 279-291 [doi]
- A Lattice Based Public Key Cryptosystem Using Polynomial RepresentationsSeong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha. 292-308 [doi]
- The Security of DSA and ECDSASerge Vaudenay. 309-323 [doi]
- Side-Channel Attacks on Textbook RSA and ElGamal EncryptionUlrich Kühn. 324-336 [doi]
- On the Security of HFE, HFEv- and QuartzNicolas Courtois, Magnus Daum, Patrick Felke. 337-350 [doi]
- Generic Attacks and the Security of QuartzNicolas Courtois. 351-364 [doi]