Abstract is missing.
- On the Security of the Algebraic Eraser Tag Authentication ProtocolSimon R. Blackburn, Matthew J. B. Robshaw. 3-17 [doi]
- A Cryptographic Analysis of UMTS/LTE AKAStéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Cristina Onete, Benjamin Richard. 18-35 [doi]
- Low-Cost Mitigation Against Cold Boot Attacks for an Authentication TokenIan Goldberg, Graeme Jenkinson, Frank Stajano. 36-57 [doi]
- Two More Efficient Variants of the J-PAKE ProtocolJean Lancrenon, Marjan Skrobot, Qiang Tang 0001. 58-76 [doi]
- Hash-Based TPM Signatures for the Quantum WorldMegumi Ando, Joshua D. Guttman, Alberto R. Papaleo, John Scire. 77-94 [doi]
- Fuzzy Signatures: Relaxing Requirements and a New ConstructionTakahiro Matsuda 0002, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka. 97-116 [doi]
- Foundations of Fully Dynamic Group SignaturesJonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth. 117-136 [doi]
- A Lattice-Based Group Signature Scheme with Message-Dependent OpeningBenoît Libert, Fabrice Mouhartem, Khoa Nguyen. 137-155 [doi]
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet SecurityRosario Gennaro, Steven Goldfeder, Arvind Narayanan. 156-174 [doi]
- Legally Fair Contract Signing Without KeystonesHouda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval. 175-190 [doi]
- Why Software DoS Is Hard to Fix: Denying Access in Embedded Android PlatformsRyan Johnson 0002, Mohamed Elsabagh, Angelos Stavrou. 193-211 [doi]
- Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak ClusteringXiejun Ni, Daojing He, Sammy Chan, Farooq Ahmad. 212-227 [doi]
- More Efficient Constructions for Inner-Product EncryptionSomindu C. Ramanna. 231-248 [doi]
- Attribute Based Encryption with Direct Efficiency TradeoffNuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada 0001. 249-266 [doi]
- Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded FunctionsXavier Boyen, Qinyi Li. 267-284 [doi]
- Offline Witness EncryptionHamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak. 285-303 [doi]
- Deterministic Public-Key Encryption Under Continual LeakageVenkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters. 304-323 [doi]
- Better Preprocessing for Secure Multiparty ComputationCarsten Baum, Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias. 327-345 [doi]
- Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable ComputationBerry Schoenmakers, Meilof Veeningen, Niels de Vreede. 346-366 [doi]
- Verifiable Multi-party Computation with Perfectly Private Audit TrailEdouard Cuvelier, Olivier Pereira. 367-385 [doi]
- Practical Fault-Tolerant Data AggregationKrzysztof Grining, Marek Klonowski, Piotr Syga. 386-404 [doi]
- Accelerating Homomorphic Computations on Rational NumbersAngela Jäschke, Frederik Armknecht. 405-423 [doi]
- New Techniques for Non-interactive Shuffle and Range ArgumentsAlonso-González, Carla Ràfols. 427-444 [doi]
- Constrained PRFs for Unbounded Inputs with Short KeysHamza Abusalah, Georg Fuchsbauer. 445-463 [doi]
- Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxesYosuke Todo, Kazumaro Aoki. 467-484 [doi]
- Automatic Search of Linear Trails in ARX with Applications to SPECK and ChaskeyYunwen Liu, Qingju Wang, Vincent Rijmen. 485-499 [doi]
- Square Attack on 7-Round Kiasu-BCChristoph Dobraunig, Maria Eichlseder, Florian Mendel. 500-517 [doi]
- On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon VariantsKota Kondo, Yu Sasaki, Tetsu Iwata. 518-536 [doi]
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to PracticeAlex Biryukov, Daniel Dinu, Johann Großschädl. 537-557 [doi]
- Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow SlicingPierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque. 561-579 [doi]
- Parallel Implementation of BDD Enumeration for LWEElena Kirshanova, Alexander May 0001, Friedrich Wiemer. 580-591 [doi]
- Memory Carving in Embedded Devices: Separate the Wheat from the ChaffThomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger. 592-608 [doi]
- CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape DiscoveryMauro Conti, Claudio Guarisco, Riccardo Spolaor. 611-628 [doi]
- TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on SmartphonesWeizhi Meng, Wenjuan Li, Duncan S. Wong, Jianying Zhou. 629-647 [doi]
- Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use CaseJagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kâafar. 648-665 [doi]