A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation / Feng Bao ; Robert H. Deng |
A New Aspect of Dual Basis for Efficient Field Arithmetic / Chang-Hyi Lee ; Jong-In Lim |
On the Security of Random Sources / Jean-Sébastien Coron |
Anonymous Fingerprinting Based on Committed Oblivious Transfer / Josep Domingo-Ferrer |
How to Enhance the Security of Public-Key Encryption at Minimum Cost / Eiichiro Fujisaki ; Tatsuaki Okamoto |
Encrypted Message Authentication by Firewalls / Chandana Gamage ; Jussipekka Leiwo ; Yuliang Zheng |
A Relationship between One-Wayness and Correlation Intractability / Satoshi Hada ; Toshiaki Tanaka |
Message Recovery Fair Blind Signature / Hyung-Woo Lee ; Tai-Yun Kim |
On Quorum Controlled Asymmetric Proxy Re-encryption / Markus Jakobsson |
Mini-Cash: A Minimalistic Approach to E-Commerce |
Preserving Privacy in Distributed Delegation with Fast Certificates / Pekka Nikander ; Yki Kortesniemi ; Jonna Partanen |
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol / Simon Blake-Wilson ; Alfred Menezes |
Toward Fair International Key Escrow - An Attempt by Distributed Trusted Third Agencies with Threshold Cryptography - / Shingo Miyazaki ; Ikuko Kuroda ; Kouichi Sakurai |
How to Copyright a Function ? / David Naccache ; Adi Shamir ; Julien P. Stern |
On the Security of RSA Screening |
The Effectiveness of Lattice Attacks Against Low-Exponent RSA / Christophe Coupé ; Phong Nguyen ; Jacques Stern |
A Trapdoor Permutation Equivalent to Factoring / Pascal Paillier |
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor |
Evaluating Differential Fault Analysis of Unknown Cryptosystems |
Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project / Montse Rubia ; Juan Carlos Cruellas ; Manel Medina |
Hash Functions and the MAC Using All-or-Nothing Property / Sang Uk Shin ; Kyung Hyune Rhee ; Jae Woo Yoon |
Decision Oracles are Equivalent to Matching Oracles / Helena Handschuh ; Yiannis Tsiounis ; Moti Yung |
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret / Yuji Watanabe ; Hideki Imai |
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy / Adam Young |
A Secure Pay-per-View Scheme for Web-Based Video Service / Jianying Zhou ; Kwok-Yan Lam |
Author Index |
A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation / Feng Bao ; Robert H. Deng |
A New Aspect of Dual Basis for Efficient Field Arithmetic / Chang-Hyi Lee ; Jong-In Lim |
On the Security of Random Sources / Jean-Sébastien Coron |