Abstract is missing.
- Optimal Bounds for Multi-Prime Φ-Hiding AssumptionKaori Tosu, Noboru Kunihiro. 1-14 [doi]
- Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key ExchangeAtsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu. 15-28 [doi]
- A Game-Theoretic Perspective on Oblivious TransferHaruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga. 29-42 [doi]
- Faster Algorithm for Solving Hard Knapsacks for Moderate Message LengthYuji Nagashima, Noboru Kunihiro. 43-56 [doi]
- Accelerating the Secure Distributed Computation of the Mean by a Chebyshev ExpansionPeter Lory, Manuel Liedel. 57-70 [doi]
- Security Analysis of the Lightweight Block Ciphers XTEA, LED and PiccoloTakanori Isobe, Kyoji Shibutani. 71-86 [doi]
- Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to CamelliaYu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar. 87-100 [doi]
- Low Data Complexity Attack on Reduced Camellia-256Jiazhe Chen, Leibo Li. 101-114 [doi]
- Cryptanalysis of RSA with a Small ParameterXianmeng Meng, Xuexin Zheng. 115-123 [doi]
- An Algebraic Broadcast Attack against NTRUJintai Ding, Yanbin Pan, Yingpu Deng. 124-137 [doi]
- Analysis of Indirect Message Injection for MAC Generation Using Stream CiphersMufeed Juma AlMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong. 138-151 [doi]
- Weimar-DM: A Highly Secure Double-Length Compression FunctionEwan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel. 152-165 [doi]
- An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard ModelK. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan. 166-179 [doi]
- Zero-Knowledge Protocols for the McEliece EncryptionKirill Morozov, Tsuyoshi Takagi. 180-193 [doi]
- Effort-Release Public-Key Encryption from Cryptographic PuzzlesJothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy. 194-207 [doi]
- Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash ProofsManh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga. 208-222 [doi]
- How to Fix Two RSA-Based PVSS Schemes - Exploration and SolutionKun Peng, Matt Henricksen. 223-234 [doi]
- Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New ConstructionsKaoru Kurosawa, Ryo Nojima, Le Trieu Phong. 235-246 [doi]
- Generalized First Pre-image Tractable Random Oracle Model and Signature SchemesXiao Tan, Duncan S. Wong. 247-260 [doi]
- A Short Non-delegatable Strong Designated Verifier SignatureHaibo Tian, Xiaofeng Chen 0001, Jin Li. 261-279 [doi]
- Deterministic Identity Based Signature Scheme and Its Application for Aggregate SignaturesS. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan. 280-293 [doi]
- Fully Leakage-Resilient Signatures with Auxiliary InputsTsz Hon Yuen, Siu-Ming Yiu, Lucas Chi Kwong Hui. 294-307 [doi]
- Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and CiphertextsDuong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler. 308-321 [doi]
- A Generic Construction of Accountable Decryption and Its ApplicationsXuhua Zhou, Xuhua Ding, Kefei Chen. 322-335 [doi]
- Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size CiphertextsAijun Ge, Rui Zhang 0002, Cheng Chen, Chuangui Ma, Zhenfeng Zhang. 336-349 [doi]
- Fully Private Revocable Predicate EncryptionJuan Manuel González Nieto, Mark Manulis, Dongdong Sun. 350-363 [doi]
- Anonymous ID-Based Proxy Re-EncryptionJun Shao. 364-375 [doi]
- On the Optimality of Lattices for the Coppersmith TechniqueYoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe. 376-389 [doi]
- Revocable Identity-Based Encryption from LatticesJie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen. 390-403 [doi]
- On Area, Time, and the Right Trade-OffAxel Poschmann, Matthew J. B. Robshaw. 404-418 [doi]
- Analysis of Xorrotation with Application to an HC-128 VariantPaul Stankovski, Martin Hell, Thomas Johansson. 419-425 [doi]
- Private Fingerprint MatchingSiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona. 426-433 [doi]
- Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-WalkingKaleb Lee, Colin Boyd, Juan Manuel González Nieto. 434-441 [doi]
- ICAF: A Context-Aware Framework for Access ControlA. S. M. Kayes, Jun Han, Alan W. Colman. 442-449 [doi]
- Non-malleable Instance-Dependent Commitment in the Standard ModelWenpan Jing, Haixia Xu, Bao Li. 450-457 [doi]