Abstract is missing.
- Full-Domain Subgroup Hiding and Constant-Size Group SignaturesXavier Boyen, Brent Waters. 1-15 [doi]
- A Direct Anonymous Attestation Scheme for Embedded DevicesHe Ge, Stephen R. Tate. 16-30 [doi]
- Anonymous Signatures Made EasyMarc Fischlin. 31-42 [doi]
- On the Generic and Efficient Constructions of Secure Designated Confirmer SignaturesGuilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao. 43-60 [doi]
- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance FunctionsDima Ruinskiy, Adi Shamir, Boaz Tsaban. 61-75 [doi]
- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange ProtocolAlex D. Myasnikov, Alexander Ushakov. 76-88 [doi]
- New Chosen-Ciphertext Attacks on NTRUNicolas Gama, Phong Q. Nguyen. 89-106 [doi]
- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003Daewan Han, Myung-Hwan Kim, Yongjin Yeom. 107-117 [doi]
- Optimistic Fair Exchange in a Multi-user SettingYevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum. 118-133 [doi]
- Multi-party Stand-Alone and Setup-Free Verifiably Committed SignaturesHuafei Zhu, Willy Susilo, Yi Mu. 134-149 [doi]
- Knowledge-Binding Commitments with Applications in Time-StampingAhto Buldas, Sven Laur. 150-165 [doi]
- Efficient Ring Signatures Without Random OraclesHovav Shacham, Brent Waters. 166-180 [doi]
- Traceable Ring SignatureEiichiro Fujisaki, Koutarou Suzuki. 181-200 [doi]
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random OraclesMihir Bellare, Sarah Shoup. 201-216 [doi]
- Improved On-Line/Off-Line Threshold SignaturesEmmanuel Bresson, Dario Catalano, Rosario Gennaro. 217-232 [doi]
- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key CryptosystemsJintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner. 233-248 [doi]
- Cryptanalysis of HFE with Internal PerturbationVivien Dubois, Louis Granboulan, Jacques Stern. 249-265 [doi]
- ::::l::::-Invertible Cycles for ::::M::::ultivariate ::::Q::::uadratic (::::MQ::::) Public Key CryptographyJintai Ding, Christopher Wolf, Bo-Yin Yang. 266-281 [doi]
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-HellmanEike Kiltz. 282-297 [doi]
- Parallel Key-Insulated Public Key Encryption Without Random OraclesBenoît Libert, Jean-Jacques Quisquater, Moti Yung. 298-314 [doi]
- Multi-bit Cryptosystems Based on Lattice ProblemsAkinori Kawachi, Keisuke Tanaka, Keita Xagawa. 315-329 [doi]
- Practical and Secure Solutions for Integer ComparisonJuan A. Garay, Berry Schoenmakers, José Villegas. 330-342 [doi]
- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition ProtocolTakashi Nishide, Kazuo Ohta. 343-360 [doi]
- Identity-Based Traitor TracingMichel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart. 361-376 [doi]
- Verifiable Shuffle of Large Size CiphertextsJens Groth, Steve Lu. 377-392 [doi]
- A Survey of Single-Database Private Information Retrieval: Techniques and ApplicationsRafail Ostrovsky, William E. Skeith III. 393-411 [doi]
- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi s RSANoboru Kunihiro, Kaoru Kurosawa. 412-425 [doi]
- Efficient Pseudorandom Generators Based on the DDH AssumptionReza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko. 426-441 [doi]
- Fast Batch Verification of Multiple SignaturesJung Hee Cheon, Jeong Hyun Yi. 442-457 [doi]
- A Closer Look at PKI: Security and EfficiencyAlexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi. 458-475 [doi]
- Self-Generated-Certificate Public Key Encryption Without PairingJunzuo Lai, Weidong Kou. 476-489 [doi]