| | Full-domain subgroup hiding and constant-size group signatures by Xavier Boyen and Brent Waters | | 1 |
| | A direct anonymous attestation scheme for embedded devices by He Ge and Stephen R. Tate | | 16 |
| | Anonymous signatures made easy by Marc Fischlin | | 31 |
| | On the generic and efficient constructions of secure designated confirmer signatures by Guilin Wang and Joonsang Baek and Duncan S. Wong and Feng Bao | | 43 |
| | Cryptanalysis of group-based key agreement protocols using subgroup distance functions by Dima Ruinskiy and Adi Shamir and Boaz Tsaban | | 61 |
| | Length based attack and braid groups : cryptanalysis of Anshel-Anshel-Goldfeld key exchange protocol by Alex D. Myasnikov and Alexander Ushakov | | 76 |
| | New chosen-ciphertext attacks on NTRU by Nicolas Gama and Phong Q. Nguyen | | 89 |
| | Cryptanalysis of the Paeng-Jung-Ha cryptosystem from PKC 2003 by Daewan Han and Myung-Hwan Kim and Yongjin Yeom | | 107 |
| | Optimistic fair exchange in a multi-user setting by Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum | | 118 |
| | Multi-party stand-alone and setup-free verifiably committed signatures by Huafei Zhu and Willy Susilo and Yi Mu | | 134 |
| | Knowledge-binding commitments with applications in time-stamping by Ahto Buldas and Sven Laur | | 150 |
| | Efficient ring signatures without random oracles by Hovav Shacham and Brent Waters | | 166 |
| | Traceable ring signature by Eiichiro Fujisaki and Koutarou Suzuki | | 181 |
| | Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles by Mihir Bellare and Sarah Shoup | | 201 |
| | Improved on-line/off-line threshold signatures by Emmanuel Bresson and Dario Catalano and Rosario Gennaro | | 217 |
| | High order linearization equation (HOLE) attack on multivariate public key cryptosystems by Jintai Ding and Lei Hu and Xuyun Nie and Jianyu Li and John Wagner | | 233 |
| | Cryptanalysis of HFE with internal perturbation by Vivien Dubois and Louis Granboulan and Jacques Stern | | 249 |
| | l-Invertible cycles for multivariate quadratic (MQ) public key cryptography by Jintai Ding and Christopher Wolf and Bo-Yin Yang | | 266 |
| | More... | | |