Abstract is missing.
- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 EncryptionAurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud. 1-18 [doi]
- How to Construct Interval Encryption from Binary Tree EncryptionHuang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing. 19-34 [doi]
- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor FunctionsXavier Boyen, Brent Waters. 35-52 [doi]
- Trapdoor Sanitizable Signatures Made EasyDae Hyun Yum, Jae Woo Seo, Pil Joong Lee. 53-68 [doi]
- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKsMarkus Rückert, Michael Schneider 0002, Dominique Schröder. 69-86 [doi]
- Redactable Signatures for Tree-Structured Data: Definitions and ConstructionsChristina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder. 87-104 [doi]
- Impossible Differential Cryptanalysis on Feistel Ciphers with ::::SP:::: and ::::SPS:::: Round FunctionsYuechuan Wei, Ping Li, Bing Sun, Chao Li. 105-122 [doi]
- Multi-trail Statistical Saturation AttacksBaudoin Collard, François-Xavier Standaert. 123-138 [doi]
- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G::: (+) :::Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang. 139-153 [doi]
- High Performance GHASH Function for Long MessagesNicolas Meloni, Christophe Nègre, M. Anwar Hasan. 154-167 [doi]
- Principles on the Security of AES against First and Second-Order Differential Power AnalysisJiqiang Lu, Jing Pan, Jerry den Hartog. 168-185 [doi]
- Adaptive Chosen-Message Side-Channel AttacksNicolas Veyrat-Charvillon, François-Xavier Standaert. 186-199 [doi]
- Secure Multiplicative Masking of Power FunctionsLaurie Genelle, Emmanuel Prouff, Michaël Quisquater. 200-217 [doi]
- Batch Groth-SahaiOlivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud. 218-235 [doi]
- Efficient and Secure Evaluation of Multivariate Polynomials and ApplicationsMatthew K. Franklin, Payman Mohassel. 236-254 [doi]
- Efficient Implementation of the Orlandi ProtocolThomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen. 255-272 [doi]
- Improving the Round Complexity of Traitor Tracing SchemesAggelos Kiayias, Serdar Pehlivanoglu. 273-290 [doi]
- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public ParametersJulien Bringer, Hervé Chabanne, Thomas Icart. 291-308 [doi]
- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal OverheadRosario Gennaro, Hugo Krawczyk, Tal Rabin. 309-328 [doi]
- Deniable Internet Key ExchangeAndrew Chi-Chih Yao, Yunlei Zhao. 329-348 [doi]
- A New Human Identification Protocol and Coppersmith s Baby-Step Giant-Step AlgorithmHassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang. 349-366 [doi]
- Secure Sketch for Multiple SecretsChengfang Fang, Qiming Li, Ee-Chien Chang. 367-383 [doi]
- A Message Recognition Protocol Based on Standard AssumptionsAtefeh Mashatan, Serge Vaudenay. 384-401 [doi]
- Affiliation-Hiding Key Exchange with Untrusted Group AuthoritiesMark Manulis, Bertram Poettering, Gene Tsudik. 402-419 [doi]
- Privacy-Preserving Group Discovery with Linear ComplexityMark Manulis, Benny Pinkas, Bertram Poettering. 420-437 [doi]
- Two New Efficient PIR-Writing ProtocolsHelger Lipmaa, Bingsheng Zhang. 438-455 [doi]
- Regulatory Compliant Oblivious RAMBogdan Carbunar, Radu Sion. 456-474 [doi]
- Revisiting Unpredictability-Based RFID Privacy ModelsJunzuo Lai, Robert H. Deng, Yingjiu Li. 475-492 [doi]
- On RFID Privacy with Mutual Authentication and Tag CorruptionFrederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann. 493-510 [doi]
- Social Network-Based Botnet Command-and-Control: Emerging Threats and CountermeasuresErhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi S. Sandhu. 511-528 [doi]
- COP: A Step toward Children Online PrivacyWei Xu, Sencun Zhu, Heng Xu. 529-544 [doi]
- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online AdvertisingXuhua Ding. 545-562 [doi]