A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng |
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle |
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry |
Some Remarks on a Fair Exchange Protocol / Jianying Zhou ; Robert Deng ; Feng Bao |
An Identification Scheme Based on Sparse Polynomials / Seigo Arita ; William D. Banks ; Daniel Lieman ; Igor E. Shparlinski |
A State-Based Model for Certificate Management Systems / Chuchang Liu ; Maris A. Ozols ; Marie Henderson ; Tony Cant |
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence / Reto Kohlas ; Ueli Maurer |
The Composite Discrete Logarithm and Secure Authentication / David Pointcheval |
Chosen-Ciphertext Security for Any One-Way Cryptosystem |
Short Proofs of Knowledge for Factoring / Guillaume Poupard ; Jacques Stern |
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms / X.Y.Wang ; L.C.Hui ; K.P.Chow ; W.W.Tsang ; C.F.Chong ; H.W.Chan |
All-or-Nothing Transform and Remotely Keyed Encryption Protocols / Sang Uk Shin ; Weon Shin ; Kyung Hyune Rhee |
Security of Public Key Certificate Based Authentication Protocols / Wu Wen ; Takamichi Saito ; Fumio Mizoguchi |
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2 / Tetsuya Izu ; Jun Kogure ; Kazuhiro Yokoyama |
Key Recovery in Third Generation Wireless Communication Systems / Juanma González Nieto ; DongGook Park ; Colin Boyd ; Ed Dawson |
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications / Katsuyuki Okeya ; Hiroyuki Kurumatani ; Kouichi Sakurai |
Certificates of Recoverability with Scalable Recovery Agent Security / Eric R. Verheul |
Design Validations for Discrete Logarithm Based Signature Schemes / Ernest Brickell ; Serge Vaudenay ; Moti Yung |
Optimally Efficient Accountable Time-Stamping / Ahto Buldas ; HelgerLipmaa ; Berry Schoenmakers |
"Pseudorandom Intermixing": A Tool for Shared Cryptography / YairFankel ; Philip MacKenzie |
RSA-Based Auto-recoverable Cryptosystems / Adam Young |
Efficient and Fresh Certification / Irene Gassko ; Peter S. Gemmell |
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions / Ronald Cramer ; ard |
Cryptographic Approaches to Privacy in Forensic DNA Databases / Philip Bohannon ; Markus Jakobsson ; Sukamol Srikwan |
Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes / Toru Inoue |
An Auction Protocol Which Hides Bids of Losers / Chae Hoon Lim ; Hyo Sun Hwang ; Kazue Sako |
Forward Secrecy and Its Application to Future Mobile Communications Security / Sang-Jae Moon |
Selecting Cryptographic Key Sizes / Arjen K. Lenstra |
A Structured ElGamal-Type Multisignature Scheme / Mike Burmester ; Yvo Desmedt ; Hiroshi Doi ; Masahiro Mambo ; Eiji Okamoto ; Mitsuru Tada ; Yuko Yoshifuji |
Author Index |
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng |
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle |
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry |
Some Remarks on a Fair Exchange Protocol / Jianying Zhou ; Robert Deng ; Feng Bao |
An Identification Scheme Based on Sparse Polynomials / Seigo Arita ; William D. Banks ; Daniel Lieman ; Igor E. Shparlinski |
A State-Based Model for Certificate Management Systems / Chuchang Liu ; Maris A. Ozols ; Marie Henderson ; Tony Cant |