Abstract is missing.
- ECRYPT: The Cryptographic Research Challenges for the Next DecadeBart Preneel. 1-15 [doi]
- Relationships Between Diffie-Hellman and Index Oracles Adam Young, Moti Yung. 16-32 [doi]
- On the Security Notions for Public-Key Encryption SchemesDuong Hieu Phan, David Pointcheval. 33-46 [doi]
- Efficient Unconditional Oblivious Transfer from Almost Any Noisy ChannelClaude Crépeau, Kirill Morozov, Stefan Wolf. 47-59 [doi]
- A Provably Secure Short Transitive Signature Scheme from Bilinear Group PairsSiamak Fayyaz Shahandashti, Mahmoud Salmasizadeh, Javad Mohajeri. 60-76 [doi]
- Group Signatures with Separate and Distributed AuthoritiesJun Furukawa, Shoko Yonezawa. 77-90 [doi]
- Threshold Cryptography for Mobile Ad Hoc NetworksGiovanni Di Crescenzo, Gonzalo R. Arce, Renwei Ge. 91-104 [doi]
- Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear MapFabien Laguillaumie, Damien Vergnaud. 105-119 [doi]
- Group Signatures: Better Efficiency and New Theoretical AspectsJan Camenisch, Jens Groth. 120-133 [doi]
- Efficient Blind Signatures Without Random OraclesJan Camenisch, Maciej Koprowski, Bogdan Warinschi. 134-148 [doi]
- Minimalist Cryptography for Low-Cost RFID TagsAri Juels. 149-164 [doi]
- On the Key Exposure Problem in Chameleon HashesGiuseppe Ateniese, Breno de Medeiros. 165-179 [doi]
- Identity-Based Zero KnowledgeJonathan Katz, Rafail Ostrovsky, Michael O. Rabin. 180-192 [doi]
- A Robust Multisignatures Scheme with Applications to Acknowledgment AggregationClaude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik. 193-207 [doi]
- Efficient Key Encapsulation to Multiple PartiesNigel P. Smart. 208-219 [doi]
- Improved Signcryption from q-Diffie-Hellman ProblemsBenoît Libert, Jean-Jacques Quisquater. 220-234 [doi]
- Colored Visual Cryptography Without Color DarkeningStelvio Cimato, Roberto De Prisco, Alfredo De Santis. 235-248 [doi]
- On the Size of Monotone Span ProgramsVentzislav Nikov, Svetla Nikova, Bart Preneel. 249-262 [doi]
- Universally Composable DKG with Linear Number of ExponentiationsDouglas Wikström. 263-277 [doi]
- An Algebraic Approach to NTRU (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear EquationsJoseph H. Silverman, Nigel P. Smart, Frederik Vercauteren. 278-293 [doi]
- Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKCChristopher Wolf, An Braeken, Bart Preneel. 294-309 [doi]
- The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear FiltersMiodrag J. Mihaljevic, Hideki Imai. 310-323 [doi]
- Non-randomness of the Full 4 and 5-Pass HAVALHirotaka Yoshida, Alex Biryukov, Christophe De Cannière, Joseph Lano, Bart Preneel. 324-336 [doi]
- Controlling Spam by Secure Internet Content SelectionAmir Herzberg. 337-350 [doi]
- On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol RevisitedKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland. 351-366 [doi]
- How to Embed Short Cycles into Large Nonlinear Feedback-Shift RegistersLe Van Ly, Werner Schindler. 367-380 [doi]