Abstract is missing.
- Analysing the IOBC Authenticated Encryption ModeChris J. Mitchell. 1-12 [doi]
- A Chosen IV Related Key Attack on Grain-128aSubhadeep Banik, Subhamoy Maitra, Santanu Sarkar, Meltem Sönmez Turan. 13-26 [doi]
- Cryptanalysis of Helix and Phelix RevisitedZhenqing Shi, Bin Zhang 0003, Dengguo Feng. 27-40 [doi]
- Attacks on Multi-Prime RSA with Small Prime DifferenceHui Zhang, Tsuyoshi Takagi. 41-56 [doi]
- Factoring Multi-power RSA Modulus N = p r q with Partial Known BitsYao Lu, Rui Zhang 0002, Dongdai Lin. 57-71 [doi]
- Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA AssumptionMasayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya. 72-87 [doi]
- Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith's Technique and Applications to RSAYoshinori Aono. 88-103 [doi]
- Adaptive Precision Floating Point LLLThomas Plantard, Willy Susilo, Zhenfei Zhang. 104-117 [doi]
- Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown DivisorsAtsushi Takayasu, Noboru Kunihiro. 118-135 [doi]
- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup CryptosystemBaodong Qin, Shengli Liu, Zhengan Huang. 136-151 [doi]
- Black-Box Separations and Their Adaptability to the Non-uniform ModelAhto Buldas, Margus Niitsoo. 152-167 [doi]
- Attribute-Based Identification: Definitions and Efficient ConstructionsHiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi. 168-186 [doi]
- Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt"Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo. 187-202 [doi]
- Injective Encodings to Elliptic CurvesPierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi. 203-218 [doi]
- Membership Encryption and Its ApplicationsFuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan. 219-234 [doi]
- Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output SizeAhto Buldas, Risto Laanoja. 235-250 [doi]
- Improved Boomerang Attacks on SM3Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang. 251-266 [doi]
- Expressive Cryptography: Lattice PerspectivesXavier Boyen. 267 [doi]
- Related-Key Boomerang Attacks on KATAN32/48/64Takanori Isobe, Yu Sasaki, Jiageng Chen. 268-285 [doi]
- Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation CoefficientJunko Takahashi, Toshinori Fukunaga, Kazumaro Aoki, Hitoshi Fuji. 286-301 [doi]
- Upper Bounds for the Security of Several Feistel NetworksYosuke Todo. 302-317 [doi]
- Fairness in Concurrent Signatures RevisitedWilly Susilo, Man Ho Au, Yang Wang, Duncan S. Wong. 318-329 [doi]
- Formalizing Group Blind Signatures and Practical Constructions without Random OraclesEssam Ghadafi. 330-346 [doi]
- Analysis of the Non-perfect Table Fuzzy Rainbow TradeoffByoung-Il Kim, Jin Hong 0001. 347-362 [doi]
- Complexity of Increasing the Secure Connectivity in Wireless Ad Hoc NetworksSeyit Ahmet Çamtepe. 363-378 [doi]
- Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get?Kristian Gjøsteen, George Petrides, Asgeir Steine. 379-387 [doi]
- Count-Min Sketches for Estimating Password Frequency within Hamming Distance TwoLeah South, Douglas Stebila. 388-402 [doi]
- A Rational Secret Sharing Protocol with Unconditional Security in the Synchronous SettingYang Yu, Zhanfei Zhou. 403-418 [doi]
- Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty ComputationRyo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada, Katsumi Takahashi. 419-434 [doi]
- Public Key Cryptography for Mobile CloudYuliang Zheng. 435 [doi]