Distributed Systems Security: Foundations.- Edge Eavesdropping Games.- Universally Composable Simultaneous Broadcast.- Signature Schemes Variants.- Relations Among Security Notions for Undeniable Signature Schemes.- Concurrent Blind Signatures Without Random Oracles.- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions.- Block Ciphers Analysis.- Understanding Two-Round Differentials in AES.- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b.- Anonymity and E-Commerce.- Constant-Size Dynamic k-TAA.- On Secure Orders in the Presence of Faults.- Balancing Accountability and Privacy Using E-Cash (Extended Abstract).- Public Key Encryption and Key Exchange.- About the Security of MTI/C0 and MQV.- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles.- A New Key Exchange Protocol Based on MQV Assuming Public Computations.- Secret Sharing.- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants.- Cheating Immune (2,n)-Threshold Visual Secret Sharing.- Rational Secret Sharing, Revisited.- Symmetric Key Cryptanalysis and Randomness.- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).- Distinguishing Stream Ciphers with Convolutional Filters.- On Statistical Testing of Random Numbers Generators.- Applied Authentication.- Lightweight Email Signatures (Extended Abstract).- Shoehorning Security into the EPC Tag Standard.- Proof-Carrying Proxy Certificates.- Public Key Related Cryptanalysis.- Cryptanalysis of Rainbow.- An Improved LPN Algorithm.- Invited Talk.- Theory and Practice of Multiparty Computation.