Encryption Schemes |
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive / Kouichi Sakurai ; Tsuyoshi Takagi |
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages / Jean-Sebastien Coron ; Helena Handschuh ; Marc Joye ; Pascal Paillier ; David Pointcheval ; Christophe Tymen |
On Sufficient Randomness for Secure Public-Key Cryptosystems / Takeshi Koshiba |
Multi-recipient Public-Key Encryption with Shortened Ciphertext / Kaoru Kurosawa |
Signature Schemes |
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code / Goichiro Hanaoka ; Junji Shikata ; Yuliang Zheng ; Hideki Imai |
Formal Proofs for the Security of Signcryption / Joonsang Baek ; Ron Steinfeld |
A Provably Secure Restrictive Partially Blind Signature Scheme / Greg Maitland ; Colin Boyd |
Protocols I |
M + 1-st Price Auction Using Homomorphic Encryption / Masayuki Abe ; Koutarou Suzuki |
Client/Server Tradeoffs for Online Elections / Ivan Damgard ; Mads Jurik |
Self-tallying Elections and Perfect Ballot Secrecy / Aggelos Kiayias ; Moti Yung |
Protocols II |
Efficient 1-Out-n Oblivious Transfer Schemes / Wen-Guey Tzeng |
Linear Code Implies Public-Key Traitor Tracing / Takuya Yoshida |
Design and Security Analysis of Anonymous Group Identification Protocols / Chan H. Lee ; Xiaotie Deng ; Huafei Zhu |
On the Security of the Threshold Scheme |
Based on the Chinese Remainder Theorem / Michael Quisquater ; Bart Preneel ; Joos Vandewalle |
Cryptanalysis |
Solving Underdefined Systems of Multivariate Quadratic Equations / Nicolas Courtois ; Louis Goubin ; Willi Meier ; Jean-Daniel Tacier |
Selective Forgery of RSA Signatures with Fixed-Pattern Padding / Arjen K. Lenstra ; Igor E. Shparlinski |
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 / Kazukuni Kobara |
Side Channels |
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation / Roman Novak |
A Combined Timing and Power Attack / Werner Schindler |
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks / Tetsuya Izu |
Invited Talk |
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report |
ECC Implementations |
An Improved Method of Multiplication on Certain Elliptic Curves / Young-Ho Park ; Sangho Oh ; Sangjin Lee ; Jongin Lim ; Maenghee Sung |
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves / Sangtae Jeong ; Chang Han Kim |
Weierstraß Elliptic Curves and Side-Channel Attacks / Eric Brier |
Applications |
One-Way Cross-Trees and Their Applications / Sung-Ming Yen |
RSA Key Generation with Verifiable Randomness / Ari Juels ; Jorge Guajardo |
New Minimal Modified Radix-r Representation with Applications to Smart Cards |
Author Index |
Encryption Schemes |
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive / Kouichi Sakurai ; Tsuyoshi Takagi |
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages / Jean-Sebastien Coron ; Helena Handschuh ; Marc Joye ; Pascal Paillier ; David Pointcheval ; Christophe Tymen |
On Sufficient Randomness for Secure Public-Key Cryptosystems / Takeshi Koshiba |
Multi-recipient Public-Key Encryption with Shortened Ciphertext / Kaoru Kurosawa |
Signature Schemes |