Abstract is missing.
- Probabilistic Multivariate CryptographyAline Gouget, Jacques Patarin. 1-18 [doi]
- Short 2-Move Undeniable SignaturesJean Monnerat, Serge Vaudenay. 19-36 [doi]
- Searching for Compact Algorithms: cgenMatthew J. B. Robshaw. 37-49 [doi]
- On Pairing-Based CryptosystemsTatsuaki Okamoto. 50-66 [doi]
- A New Signature Scheme Without Random Oracles from Bilinear PairingsFangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu. 67-80 [doi]
- Efficient Dynamic ::::k::::-Times Anonymous AuthenticationLan Nguyen. 81-98 [doi]
- Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?Claire Whelan, Michael Scott. 99-114 [doi]
- Factorization of Square-Free Integers with High Bits KnownBagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta. 115-130 [doi]
- Scalar Multiplication on Koblitz Curves Using Double BasesRoberto Maria Avanzi, Francesco Sica. 131-146 [doi]
- Compressed Jacobian Coordinates for OEFFumitaka Hoshino, Tetsutaro Kobayashi, Kazumaro Aoki. 147-156 [doi]
- On the Definition of Anonymity for Ring SignaturesMiyako Ohkubo, Masayuki Abe. 157-174 [doi]
- Escrowed Linkability of Ring Signatures and Its ApplicationsSherman S. M. Chow, Willy Susilo, Tsz Hon Yuen. 175-192 [doi]
- Dynamic Fully Anonymous Short Group SignaturesCécile Delerablée, David Pointcheval. 193-210 [doi]
- Formalizing Human IgnorancePhillip Rogaway. 211-228 [doi]
- Discrete Logarithm Variants of VSHArjen K. Lenstra, Dan Page, Martijn Stam. 229-242 [doi]
- How to Construct Sufficient Conditions for Hash FunctionsYu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta. 243-259 [doi]
- Improved Fast Correlation Attack on the Shrinking and Self-shrinking GeneratorsKitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong. 260-270 [doi]
- On the Internal Structure of Alpha-MACJianyong Huang, Jennifer Seberry, Willy Susilo. 271-285 [doi]
- A Weak Key Class of XTEA for a Related-Key Rectangle AttackEunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim. 286-297 [doi]
- Deniable Group Key AgreementJens-Matthias Bohli, Rainer Steinwandt. 298-311 [doi]
- An Ideal and Robust Threshold RSAHossein Ghodosi, Josef Pieprzyk. 312-321 [doi]
- Towards Provably Secure Group Key Agreement Building on Group TheoryJens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt. 322-336 [doi]
- Universally Composable Identity-Based EncryptionRyo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto. 337-353 [doi]
- Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext RateDuong Hieu Phan. 354-365 [doi]
- Reducing the Spread of Damage of Key Exposures in Key-Insulated EncryptionThi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. 366-384 [doi]