Abstract is missing.
- Efficient Electronic Gambling: An Extended Implementation of the Toolbox for Mental Card GamesHeiko Stamer. 1-12
- Algebraic Attacks and AnnihilatorsFrederik Armknecht. 13-21
- A Secure Network Storage System with Information PrivacySeongHan Shin, Kazukuni Kobara, Hideki Imai. 22-31
- A cryptosystem à la ElGamal on an elliptic curve over F::p:: [epsilon]Marie Virat. 32-44
- A Scanning Tool for PC Root Public Key StoresAdil Alsaid, Chris J. Mitchell. 45-52
- State Recovery Attacks on Pseudorandom GeneratorsAndrey Sidorenko, Berry Schoenmakers. 53-63
- Related-Cipher Attacks on Block Ciphers with Flexible Number of RoundsJaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong. 64-75
- Collision attacks on processors with cache and countermeasuresCédric Lauradoux. 76-85
- Applications of Hiding in RSAEabhnat Ní Fhloinn, Michael Purser. 86-97
- Publicly Verfiable Secret Sharing from Paillier s CryptosystemAlexandre Ruiz, Jorge Luis Villar. 98-108
- Issues on Designing a Cryptographic CompilerStefan Lucks, Nico Schmoigl, Emin Islam Tatli. 109-122
- Analysis of simplified variants of SHA-256Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen. 123-134