: Cryptographically Generated Addresses (CGA).
, Kan Zhang
: Validating and Securing Spontaneous Associations between Wireless Devices.
Ueli M. Maurer
: Intrinsic Limitations of Digital Signatures and How to Cope with Them.
: Security Analysis of a Password Authenticated Key Exchange Protocol.
Attacks on Public Key Algorithms
: Cryptanalysis of an Algebraic Privacy Homomorphism.
, Sumio Morioka
: Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES.
: Foundations of Differential Cryptanalysis in Abelian Groups.