Abstract is missing.
- Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering SchemesZhelei Sun, Peng Wang, Liting Zhang. 3-19 [doi]
- Cryptanalysis of Reduced-Round WhirlwindBingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li. 20-38 [doi]
- Improving the Biclique Cryptanalysis of AESBiaoshuai Tao, Hongjun Wu. 39-56 [doi]
- A New General Framework for Secure Public Key Encryption with Keyword SearchRongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang. 59-76 [doi]
- Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static AssumptionsYusuke Sakai, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta. 77-92 [doi]
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length MessageTarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya. 93-106 [doi]
- Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNSChristophe Nègre, Guilherme Perin. 107-124 [doi]
- Towards Forward Security Properties for PEKS and IBEQiang Tang. 127-144 [doi]
- IBE Under k k -LIN with Shorter Ciphertexts and Private KeysKaoru Kurosawa, Le Trieu Phong. 145-159 [doi]
- Improved Identity-Based Online/Offline EncryptionJianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo. 160-173 [doi]
- Constructions of CCA-Secure Revocable Identity-Based EncryptionYuu Ishida, Yohei Watanabe, Junji Shikata. 174-191 [doi]
- Linkable Message Tagging: Solving the Key Distribution Problem of Signature SchemesFelix Günther, Bertram Poettering. 195-212 [doi]
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencyYuyu Wang, Keisuke Tanaka. 213-229 [doi]
- Constant Size Ring Signature Without Random OraclePriyanka Bose, Dipanjan Das 0002, Chandrasekaran Pandu Rangan. 230-247 [doi]
- Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent AssumptionTingting Zhang, Hongda Li, Guifang Huang. 251-269 [doi]
- Modelling Ciphersuite and Version Negotiation in the TLS ProtocolBenjamin Dowling, Douglas Stebila. 270-288 [doi]
- VisRAID: Visualizing Remote Access for Intrusion DetectionLeliel Trethowen, Craig Anslow, Stuart Marshall, Ian Welch. 289-306 [doi]
- BP-XACML an Authorisation Policy Language for Business ProcessesKhalid Alissa, Jason Reid, Ed Dawson, Farzad Salim. 307-325 [doi]
- How TKIP Induces Biases of Internal States of Generic RC4Ryoma Ito, Atsuko Miyaji. 329-342 [doi]
- Preventing Fault Attacks Using Fault Randomization with a Case Study on AESShamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury. 343-355 [doi]
- Analysis of Rainbow Tables with FingerprintsGildas Avoine, Adrien Bourgeois, Xavier Carpent. 356-374 [doi]
- A New Public Remote Integrity Checking Scheme with User PrivacyYiteng Feng, Yi Mu, Guomin Yang, Joseph K. Liu. 377-394 [doi]
- Efficient Dynamic Provable Data Possession with Public Verifiability and Data PrivacyClémentine Gritti, Willy Susilo, Thomas Plantard. 395-412 [doi]
- Privately Computing Set-Union and Set-Intersection Cardinality via Bloom FiltersRolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, Jörn Tillmanns. 413-430 [doi]
- Generalizing PMAC Under Weaker AssumptionsNilanjan Datta, Kan Yasuda. 433-450 [doi]
- sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained DevicesMegha Agrawal, Donghoon Chang, Somitra Sanadhya. 451-468 [doi]
- Secure Statistical Analysis Using RLWE-Based Homomorphic EncryptionMasaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba. 471-487 [doi]
- Bad Directions in Cryptographic Hash FunctionsDaniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen. 488-508 [doi]