Abstract is missing.
- Edge Eavesdropping GamesAmos Beimel, Matthew K. Franklin. 1-17 [doi]
- Universally Composable Simultaneous BroadcastAlejandro Hevia. 18-33 [doi]
- Relations Among Security Notions for Undeniable Signature SchemesKaoru Kurosawa, Swee-Huay Heng. 34-48 [doi]
- Concurrent Blind Signatures Without Random OraclesAggelos Kiayias, Hong-Sheng Zhou. 49-62 [doi]
- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box AssumptionsFabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater. 63-77 [doi]
- Understanding Two-Round Differentials in AESJoan Daemen, Vincent Rijmen. 78-94 [doi]
- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64bJiqiang Lu, Changhoon Lee, Jongsung Kim. 95-110 [doi]
- Constant-Size Dynamic ::::k::::-TAAMan Ho Au, Willy Susilo, Yi Mu. 111-125 [doi]
- On Secure Orders in the Presence of FaultsAmir Herzberg, Igal Yoffe. 126-140 [doi]
- Balancing Accountability and Privacy Using E-Cash (Extended Abstract)Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya. 141-155 [doi]
- About the Security of MTI/C0 and MQVSébastien Kunz-Jacques, David Pointcheval. 156-172 [doi]
- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random OraclesDavid Galindo, Eike Kiltz. 173-185 [doi]
- A New Key Exchange Protocol Based on MQV Assuming Public ComputationsSébastien Kunz-Jacques, David Pointcheval. 186-200 [doi]
- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three ParticipantsJaume Martí-Farré, Carles Padró. 201-215 [doi]
- Cheating Immune (2, ::::n::::)-Threshold Visual Secret SharingRoberto De Prisco, Alfredo De Santis. 216-228 [doi]
- Rational Secret Sharing, RevisitedS. Dov Gordon, Jonathan Katz. 229-241 [doi]
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong. 242-256 [doi]
- Distinguishing Stream Ciphers with Convolutional FiltersJoan Daemen, Gilles Van Assche. 257-270 [doi]
- On Statistical Testing of Random Numbers GeneratorsFida El Haje, Yuri Golubev, Pierre-Yvan Liardet, Yannick Teglia. 271-287 [doi]
- Lightweight Email Signatures (Extended Abstract)Ben Adida, David Chau, Susan Hohenberger, Ronald L. Rivest. 288-302 [doi]
- Shoehorning Security into the EPC Tag StandardDaniel V. Bailey, Ari Juels. 303-320 [doi]
- Proof-Carrying Proxy CertificatesWalid Bagga, Stefano Crosta, Refik Molva. 321-335 [doi]
- Cryptanalysis of RainbowOlivier Billet, Henri Gilbert. 336-347 [doi]
- An Improved LPN AlgorithmÉric Levieil, Pierre-Alain Fouque. 348-359 [doi]
- Theory and Practice of Multiparty ComputationIvan Damgård. 360-364 [doi]