| | Number Theory and Elliptic Curve | | |
| | A Kilobit Special Number Field Sieve Factorization | | 1 |
| | When e-th Roots Become Easier Than Factoring | | 13 |
| | Faster Addition and Doubling on Elliptic Curves | | 29 |
| | Protocol | | |
| | A Non-interactive Shuffle with Pairing Based Verifiability | | 51 |
| | On Privacy Models for RFID | | 68 |
| | Invited Talk I | | |
| | Obtaining Universally Compoable Security: Towards the Bare Bones of Trust | | 88 |
| | Hash Function Design | | |
| | A Simple Variant of the Merkle-Damgard Scheme with a Permutation | | 113 |
| | Seven-Property-Preserving Iterated Hashing: ROX | | 130 |
| | How to Build a Hash Function from Any Collision-Resistant Function | | 147 |
| | Group/Broadcast Cryptography | | |
| | Fully Anonymous Group Signatures Without Random Oracles | | 164 |
| | Group Encryption | | 181 |
| | Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys | | 200 |
| | MAC and Implementation | | |
| | Boosting Merkle-Damgard Hashing for Message Authentication | | 216 |
| | On Efficient Message Authentication Via Block Cipher Design Techniques | | 232 |
| | Symmetric Key Cryptography on Modern Graphics Hardware | | 249 |
| | Multiparty Computation I | | |
| | Blind Identity-Based Encryption and Simulatable Oblivious Transfer | | 265 |
| | Multi-party Indirect Indexing and Applications | | 283 |
| | Two-Party Computing with Encrypted Data | | 298 |
| | Block Ciphers | | |
| | Known-Key Distinguishers for Some Block Ciphers | | 315 |
| | More... | | |