Abstract is missing.
- New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang. 16-33 [doi]
- Results on the Immunity of Boolean Functions against Probabilistic Algebraic AttacksMeicheng Liu, Dongdai Lin, Dingyi Pei. 34-46 [doi]
- Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial RepresentationYusong Du, Fangguo Zhang. 47-60 [doi]
- Improving the Algorithm 2 in Multidimensional Linear CryptanalysisPhuong Ha Nguyen, Hongjun Wu, Huaxiong Wang. 61-74 [doi]
- State Convergence in the Initialisation of Stream CiphersSui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson. 75-88 [doi]
- On Maximum Differential Probability of Generalized FeistelKazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri. 89-105 [doi]
- Double SP-Functions: Enhanced Generalized Feistel Networks - Extended AbstractAndrey Bogdanov, Kyoji Shibutani. 106-119 [doi]
- Algebraic Techniques in Differential Cryptanalysis RevisitedMeiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel. 120-141 [doi]
- Faster and Smoother - VSH RevisitedJuraj Sarinay. 142-156 [doi]
- Cryptanalysis of the Compression Function of SIMDHongbo Yu, Xiaoyun Wang. 157-171 [doi]
- Electronic Cash with Anonymous User SuspensionMan Ho Au, Willy Susilo, Yi Mu. 172-188 [doi]
- ::::T::::-Robust Scalable Group Key Exchange Protocol with ::::O::::(log::::n::::) ComplexityTetsuya Hatano, Atsuko Miyaji, Takashi Sato. 189-207 [doi]
- Application-Binding Protocol in the User Centric Smart Card Ownership ModelRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 208-225 [doi]
- Security in Depth through Smart Space CascadesBenjamin W. Long. 226-240 [doi]
- GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption SystemsMingwu Zhang, Tsuyoshi Takagi. 241-258 [doi]
- An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder TheoremYun Zhang, Christophe Tartary, Huaxiong Wang. 259-275 [doi]
- DMIPS - Defensive Mechanism against IP SpoofingShashank Lagishetty, Pruthvi Reddy Sabbu, Kannan Srinathan. 276-291 [doi]
- Provably Secure Key Assignment Schemes from FactoringEduarda S. V. Freire, Kenneth G. Paterson. 292-309 [doi]
- Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and KeyYamin Liu, Bao Li, Xianhui Lu, Dingding Jia. 310-318 [doi]
- Generic Construction of Strongly Secure Timed-Release Public-Key EncryptionAtsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito. 319-336 [doi]
- Identity-Based Server-Aided DecryptionJoseph K. Liu, Cheng-Kang Chu, Jianying Zhou. 337-352 [doi]
- A Generic Variant of NIST s KAS2 Key Agreement ProtocolSanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu. 353-370 [doi]
- A Single Key Pair is Adequate for the Zheng SigncryptionJia-Fan, Yuliang Zheng, Xiaohu Tang. 371-388 [doi]
- Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained AuthorizationQiang Tang. 389-406 [doi]
- Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster)Reza Sepahi, Ron Steinfeld, Josef Pieprzyk. 407-411 [doi]
- Compliance or Security, What Cost? (Poster)Craig Wright. 412-416 [doi]
- Preimage Attacks on Full-ARIRANG (Poster)Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama. 417-422 [doi]
- Finding Collisions for Reduced ::::Luffa::::-256 v2 (Poster)Bart Preneel, Hirotaka Yoshida, Dai Watanabe. 423-427 [doi]
- Improved Security Analysis of Fugue-256 (Poster)Praveen Gauravaram, Lars R. Knudsen, Nasour Bagheri, Lei Wei. 428-432 [doi]
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling. 433-438 [doi]
- Toward Dynamic Attribute-Based Signcryption (Poster)Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman. 439-443 [doi]
- A Verifiable Distributed Oblivious Transfer ProtocolChristian L. F. Corniaux, Hossein Ghodosi. 444-450 [doi]
- Impracticality of Efficient PVSS in Real Life Security Standard (Poster)Kun Peng. 451-455 [doi]
- Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster)Hongying Liu, Yukiyasu Tsunoo, Satoshi Goto. 456-461 [doi]