Abstract is missing.
- A Universal Encryption StandardHelena Handschuh, Serge Vaudenay. 1-12 [doi]
- Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number GeneratorJohn Kelsey, Bruce Schneier, Niels Ferguson. 13-33 [doi]
- Elliptic Curve Pseudorandom Sequence GeneratorsGuang Gong, Thomas A. Berson, Douglas R. Stinson. 34-48 [doi]
- Adaptive-Attack Norm for Decorrelation and Super-PseudorandomnessSerge Vaudenay. 49-61 [doi]
- Guesswork and Variation Distance as Measures of Cipher SecurityJohn O. Pliam. 62-77 [doi]
- Modeling Linear Characteristics of Substitution-Permutation NetworksLiam Keliher, Henk Meijer, Stafford E. Tavares. 78-91 [doi]
- Strong Linear Dependence and Unbiased Distribution of Non-propagative VectorsYuliang Zheng, Xian-Mo Zhang. 92-105 [doi]
- Security of E2 against Truncated Differential CryptanalysisShiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda. 106-117 [doi]
- Key-Schedule Cryptanalysis of DEALJohn Kelsey, Bruce Schneier. 118-134 [doi]
- Efficient Evaluation of Security against Generalized Interpolation AttackKazumaro Aoki. 135-146 [doi]
- Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic OrdersDetlef Hühnlein. 147-162 [doi]
- Improving and Extending the Lim/Lee Exponentiation AlgorithmBiljana Cubaleska, Andreas Rieke, Thomas Hermann. 163-174 [doi]
- Software Optimization of Decorrelation ModuleFabrice Noilhan. 175-183 [doi]
- Pseudonym SystemsAnna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf. 184-199 [doi]
- Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial StructuresDouglas R. Stinson, Ruizhong Wei. 200-214 [doi]
- Protecting a Mobile Agent s Route against CollusionsDirk Westhoff, Markus Schneider II, Claus Unger, Firoz Kaderali. 215-225 [doi]
- Photuris: Design CriteriaWilliam Allen Simpson. 226-242 [doi]