Abstract is missing.
- Improved Zero-Knowledge Identification with LatticesPierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva. 1-17 [doi]
- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle AttacksHiroaki Anada, Seiko Arita. 18-34 [doi]
- A Calculus for Game-Based Security ProofsDavid Nowak, Yu Zhang. 35-52 [doi]
- Automating Computational Proofs for Public-Key-Based Key ExchangeLong Ngo, Colin Boyd, Juan Manuel González Nieto. 53-69 [doi]
- A Framework for Constructing Convertible Undeniable SignaturesRyo Kikuchi, Le Trieu Phong, Wakaha Ogata. 70-86 [doi]
- Efficient Confirmer Signatures from the Signature of a Commitment ParadigmLaila El Aimani. 87-101 [doi]
- Collision Resistant Double-Length HashingEwan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks. 102-118 [doi]
- Interpreting Hash Function Security ProofsJuraj Sarinay. 119-132 [doi]
- Formal and Precise Analysis of Soundness of Several Shuffling SchemesKun Peng, Feng Bao. 133-143 [doi]
- Distinguishing Distributions Using Chernoff InformationThomas Baignères, Pouyan Sepehrdad, Serge Vaudenay. 144-165 [doi]
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong. 166-183 [doi]
- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company s ReputationKeita Emura, Atsuko Miyaji, Kazumasa Omote. 184-198 [doi]
- Cryptographic Protocols from LatticesEike Kiltz. 199 [doi]
- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast CommunicationKeita Emura, Atsuko Miyaji, Kazumasa Omote. 200-213 [doi]
- Efficient Broadcast Encryption with Personalized MessagesGo Ohtake, Goichiro Hanaoka, Kazuto Ogawa. 214-228 [doi]
- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman AssumptionShota Yamada, Goichiro Hanaoka, Noboru Kunihiro. 229-243 [doi]
- Identity Based Public Verifiable Signcryption SchemeS. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan. 244-260 [doi]
- Fully Secure Threshold UnsigncryptionJavier Herranz, Alexandre Ruiz, Germán Sáez. 261-278 [doi]