Abstract is missing.
- Transparent, Distributed, and Replicated Dynamic Provable Data PossessionMohammad Etemad, Alptekin Küpçü. 1-18 [doi]
- Client-Controlled Cryptography-as-a-Service in the CloudSören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi. 19-36 [doi]
- CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud ComputingYi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou. 37-52 [doi]
- Computing on Authenticated Data for Adjustable PredicatesBjörn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein. 53-68 [doi]
- Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract)Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky. 69-83 [doi]
- From Oblivious AES to Efficient and Secure Database Join in the Multiparty SettingSven Laur, Riivo Talviste, Jan Willemson. 84-101 [doi]
- Private Database Queries Using Somewhat Homomorphic EncryptionDan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu. 102-118 [doi]
- BLAKE2: Simpler, Smaller, Fast as MD5Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein. 119-135 [doi]
- Cryptophia's Short Combiner for Collision-Resistant Hash FunctionsArno Mittelbach. 136-153 [doi]
- Generic Attacks for the Xor of k Random PermutationsJacques Patarin. 154-169 [doi]
- Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network TwistYu Sasaki. 170-185 [doi]
- Constructing Practical Signcryption KEM from Standard Assumptions without Random OraclesXiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng. 186-201 [doi]
- Sequential Aggregate Signatures Made ShorterKwangsu Lee, Dong-Hoon Lee, Moti Yung. 202-217 [doi]
- How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBERikke Bendlin, Sara Krehbiel, Chris Peikert. 218-236 [doi]
- Toward Practical Group EncryptionLaila El Aimani, Marc Joye. 237-252 [doi]
- Experimental Analysis of Attacks on Next Generation Air Traffic CommunicationMatthias Schäfer, Vincent Lenders, Ivan Martinovic. 253-271 [doi]
- Launching Generic Attacks on iOS with Approved Third-Party ApplicationsJin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou. 272-289 [doi]
- Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve CryptographyErich Wenger. 290-306 [doi]
- Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity ProcessorsMichael Henson, Stephen Taylor. 307-321 [doi]
- NEON Implementation of an Attribute-Based Encryption SchemeAna Helena Sánchez, Francisco Rodríguez-Henríquez. 322-338 [doi]
- Fast and Maliciously Secure Two-Party Computation Using the GPUTore Kasper Frederiksen, Jesper Buus Nielsen. 339-356 [doi]
- Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic CurvesAurore Guillevic. 357-372 [doi]
- FROST - Forensic Recovery of Scrambled TelephonesTilo Müller, Michael Spreitzenbarth. 373-388 [doi]
- Attacking Atmel's CryptoMemory EEPROM with Special-Purpose HardwareAlexander Wild, Tim Güneysu, Amir Moradi. 389-404 [doi]
- Keystroke Timing Analysis of on-the-fly Web AppsChee Meng Tey, Payas Gupta, Debin Gao, Yan Zhang. 405-413 [doi]
- Terrorism in Distance Bounding: Modeling Terrorist-Fraud ResistanceMarc Fischlin, Cristina Onete. 414-431 [doi]
- CrowdShare: Secure Mobile Resource SharingN. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Stanislaus Stelle. 432-440 [doi]
- Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting SystemFilip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora. 441-457 [doi]
- Exposure-Resilient One-Round Tripartite Key Exchange without Random OraclesKoutarou Suzuki, Kazuki Yoneyama. 458-474 [doi]
- Public Key Exchange Using Semidirect Product of (Semi)GroupsMaggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain. 475-486 [doi]
- Leakage Resilient IBE and IPE under the DLIN AssumptionKaoru Kurosawa, Le Trieu Phong. 487-501 [doi]
- Batch Proofs of Partial KnowledgeRyan Henry, Ian Goldberg. 502-517 [doi]
- Efficient Signatures of Knowledge and DAA in the Standard ModelDavid Bernhard, Georg Fuchsbauer, Essam Ghadafi. 518-533 [doi]
- Analysis and Improvement of Lindell's UC-Secure Commitment SchemesOlivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. 534-551 [doi]
- Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-Sonia Bogos, Ioana Boureanu, Serge Vaudenay. 552-569 [doi]