| | | Number Theory and Elliptic Curve | | |
| | | A Kilobit Special Number Field Sieve Factorization | | 1 |
| | | When e-th Roots Become Easier Than Factoring | | 13 |
| | | Faster Addition and Doubling on Elliptic Curves | | 29 |
| | | Protocol | | |
| | | A Non-interactive Shuffle with Pairing Based Verifiability | | 51 |
| | | On Privacy Models for RFID | | 68 |
| | | Invited Talk I | | |
| | | Obtaining Universally Compoable Security: Towards the Bare Bones of Trust | | 88 |
| | | Hash Function Design | | |
| | | A Simple Variant of the Merkle-Damgard Scheme with a Permutation | | 113 |
| | | Seven-Property-Preserving Iterated Hashing: ROX | | 130 |
| | | How to Build a Hash Function from Any Collision-Resistant Function | | 147 |
| | | Group/Broadcast Cryptography | | |
| | | Fully Anonymous Group Signatures Without Random Oracles | | 164 |
| | | Group Encryption | | 181 |
| | | Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys | | 200 |
| | | MAC and Implementation | | |
| | | Boosting Merkle-Damgard Hashing for Message Authentication | | 216 |
| | | On Efficient Message Authentication Via Block Cipher Design Techniques | | 232 |
| | | Symmetric Key Cryptography on Modern Graphics Hardware | | 249 |
| | | Multiparty Computation I | | |
| | | Blind Identity-Based Encryption and Simulatable Oblivious Transfer | | 265 |
| | | Multi-party Indirect Indexing and Applications | | 283 |
| | | Two-Party Computing with Encrypted Data | | 298 |
| | | Block Ciphers | | |
| | | Known-Key Distinguishers for Some Block Ciphers | | 315 |
| | More... | | |