Keynote Speech |
International Cryptography / Doug McGowan |
Cryptanalysis |
Reaction attacks against several public key cryptosystems / C. Hall ; I. Goldberg ; B. Schneier |
Cryptanalysis of some AES candidate algorithms / W. Wu ; B. Li ; D. Feng ; S. Qing |
Language Based Approach to Security |
Issues in the design of a language for role based access control / M. Hitchens ; V. Varadharajan |
Extending Erlang for safe mobile code execution / L. Brown ; D. Sahlin |
Electronic Commerce and Secret Sharing |
Detachable electronic coins / C. Pavlovski ; C. Boyd ; E. Foo |
Linear secret sharing with divisible shares / J. Pieprzyk |
Efficient publicly verifiable secret sharing schemes with fast or delayed recovery / F. Boudot ; J. Traore |
Digital Signatures |
Zero-knowledge proofs of possession of ElGamal-like digital signatures and its applications / K. Q. Nguyen ; F. Bao ; Y. Mu |
Signature scheme for controlled environments / K. Viswanathan ; E. Dawson |
On the cryptographic value of the Qth root problem / C. L. Beaver ; P. S. Gemmell ; A. M. Johnston ; W. Neumann |
Protecting Critical Information Systems / Sushil Jajodia |
Security Protocols |
Delegation chains secure up to constant length / M. Abe ; T. Okamoto |
Optimal construction of unconditionally secured ID-based key sharing scheme for large-scale networks / G. Hanaoka ; T. Nishioka ; Y. Zheng ; H. Imai |
Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack / S. Hirose ; K. Matsuura |
An extended logic for analyzing timed-release public-key protocols / M. Kudo ; A. Mathuria |
Applications |
Bringing together X.509 and EDIFACT public key infrastructures: The DEDICA project / M. Rubia ; J. C. Cruellas ; M. Medina |
User identification system based on biometrics for keystroke / K. Omote ; E. Okamoto |
Boundary conditions that influence decisions about log file formats in multi-application smart cards / C. Markantonakis |
Sending message into a definite future / W. Mao |
Cryptography |
Efficient accumulators without trapdoor / T. Sander |
Evolutionary heuristics for finding cryptographically strong S-Boxes / W. Millan ; L. Burnett ; G. Garter ; A. Clark |
Incremental authentication of tree-structured documents / P. Ekdahl ; B. Smeets |
Complexity and Security Functions |
Plateaued Functions / X.-M. Zhang |
On the linear complexity of the Naor-Reingold pseudo-random function / F. Griffin ; I. E. Shparlinski |
On the channel capacity of narrow-band subliminal channels / K. Kobara |
Author Index |
Keynote Speech |
International Cryptography / Doug McGowan |
Cryptanalysis |
Reaction attacks against several public key cryptosystems / C. Hall ; I. Goldberg ; B. Schneier |
Cryptanalysis of some AES candidate algorithms / W. Wu ; B. Li ; D. Feng ; S. Qing |
Language Based Approach to Security |