Abstract is missing.
- An Analysis of the Hermes8 Stream CiphersSteve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum. 1-10 [doi]
- On the Security of the LILI Family of Stream Ciphers Against Algebraic AttacksSultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson. 11-28 [doi]
- Strengthening NLS Against Crossword Puzzle AttackDebojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury. 29-44 [doi]
- A New Strategy for Finding a Differential Path of SHA-1Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta. 45-58 [doi]
- Preimage Attack on the Parallel FFT-Hashing FunctionDonghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee. 59-67 [doi]
- Second Preimages for Iterated Hash Functions and Their Implications on MACsNorbert Pramstaller, Mario Lamberger, Vincent Rijmen. 68-81 [doi]
- On Building Hash Functions from Multivariate Quadratic EquationsOlivier Billet, Matthew J. B. Robshaw, Thomas Peyrin. 82-95 [doi]
- An Application of the Goldwasser-Micali Cryptosystem to Biometric AuthenticationJulien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer. 96-106 [doi]
- Soft Generation of Secure Biometric KeysJovan Dj. Golic, Madalina Baltatu. 107-121 [doi]
- Flaws in Some Secret Sharing Schemes Against CheatingToshinori Araki, Satoshi Obana. 122-132 [doi]
- Efficient (::::k::::, ::::n::::) Threshold Secret Sharing Schemes Secure Against Cheating from ::::n::::-1 CheatersToshinori Araki. 133-142 [doi]
- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim. 143-157 [doi]
- Analysis of the SMS4 Block CipherFen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann. 158-170 [doi]
- Forgery Attack to an Asymptotically Optimal Traitor Tracing SchemeYongdong Wu, Feng Bao, Robert H. Deng. 171-183 [doi]
- ::::TCH::::::::o::::: A Hardware-Oriented Trapdoor CipherJean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay. 184-199 [doi]
- Anonymity on Paillier s Trap-Door PermutationRyotaro Hayashi, Keisuke Tanaka. 200-214 [doi]
- Generic Certificateless Key Encapsulation MechanismQiong Huang, Duncan S. Wong. 215-229 [doi]
- Double-Size Bipartite Modular MultiplicationMasayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume. 230-244 [doi]
- Affine Precomputation with Sole Inversion in Elliptic Curve CryptographyErik Dahmen, Katsuyuki Okeya, Daniel Schepers. 245-258 [doi]
- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEMTakeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata. 259-273 [doi]
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with WildcardsJames Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt. 274-292 [doi]
- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream AuthenticationChristophe Tartary, Huaxiong Wang. 293-307 [doi]
- Certificateless Signature RevisitedXinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu. 308-322 [doi]
- Identity-Committable Signatures and Their Extension to Group-Oriented Ring SignaturesCheng-Kang Chu, Wen-Guey Tzeng. 323-337 [doi]
- Hash-and-Sign with Weak Hashing Made SecureSylvain Pasini, Serge Vaudenay. 338-354 [doi]
- Sandwich Is Indeed Secure: How to Authenticate a Message with Just One HashingKan Yasuda. 355-369 [doi]
- Threshold Anonymous Group Identification and Zero-Knowledge ProofAkihiro Yamamura, Takashi Kurokawa, Junji Nakazato. 370-384 [doi]
- Non-interactive Manual Channel Message Authentication Based on eTCR Hash FunctionsMohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini. 385-399 [doi]
- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown UsersStefan Brands, Liesje Demuynck, Bart De Decker. 400-415 [doi]
- Efficient and Secure Comparison for On-Line AuctionsIvan Damgård, Martin Geisler, Mikkel Krøigaard. 416-430 [doi]
- Practical Compact E-CashMan Ho Au, Willy Susilo, Yi Mu. 431-445 [doi]
- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication NetworksSuvasini Panigrahi, Amlan Kundu, Shamik Sural, Arun K. Majumdar. 446-460 [doi]
- On Proactive Perfectly Secure Message TransmissionKannan Srinathan, Prasad Raghavendra, C. Pandu Rangan. 461-473 [doi]