Contents:
Andrew Odlyzko: Mathematics, cryptology, and technology ? Johannes Buchmann, Safuat Hamdy: A survey on IQ cryptography ? Jean-Marc Couveignes: Algebraic groups and discrete logarithm ? Karl Dilcher: Fermat numbers, Wieferich and Wilson primes: computations and generalizations? Andreas Enge: How to distinguish hyperelliptic curves in even characteristic ? Steven D. Galbraith: Limitations of constructive Weil descent ? Otokar Grosek, Spyros S. Magliveras, Wandi Wei: On the security of a public-key cryptosystem ? Jeffrey Hoffstein, Joseph Silverman: Optimizations for NTRU ? Michael John Jacobson, Jr., Renate Scheidler, Hugh C. Williams: The efficiency and security of a real quadratic field based key exchange protocol ? Przemyslaw Kubiak: Extending the binary gcd algorithms ? Daniel Kucner, Miroslaw Kutylowski: Stochastic kleptography detection ? Arjen K. Lenstra, Eric R. Verheul: An overview of the XTR public key system ? Siguna Mueller: A survey of IND-CCA secure public-key encryption schemes relative to factoring ? Volker Mueller: Efficient point multiplication for elliptic curves over special optimal extension fields ? Harald Niederreiter: Error-correcting codes and cryptography ? Secret public key schemes ? Attila Pethoe: Index form surfaces and construction of elliptic curves over large finite fields ? Herman te Riele: On the size of solutions of the inequality ?(ax+b)< ?(ax) ? Claus Peter Schnorr: Security of DL-encryption and signatures against generic attacks - a survey ? Edlyn Teske: Square-root algorithms for the discrete logarithm problem (a survey) ? Horst G. Zimmer: Height functions on elliptic curves.