Abstract is missing.
- A Kilobit Special Number Field Sieve FactorizationKazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik. 1-12 [doi]
- When ::::e::::-th Roots Become Easier Than FactoringAntoine Joux, David Naccache, Emmanuel Thomé. 13-28 [doi]
- Faster Addition and Doubling on Elliptic CurvesDaniel J. Bernstein, Tanja Lange. 29-50 [doi]
- A Non-interactive Shuffle with Pairing Based VerifiabilityJens Groth, Steve Lu. 51-67 [doi]
- On Privacy Models for RFIDSerge Vaudenay. 68-87 [doi]
- Obtaining Universally Compoable Security: Towards the Bare Bones of TrustRan Canetti. 88-112 [doi]
- A Simple Variant of the Merkle-Damgård Scheme with a PermutationShoichi Hirose, Je Hong Park, Aaram Yun. 113-129 [doi]
- Seven-Property-Preserving Iterated Hashing: ROXElena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton. 130-146 [doi]
- How to Build a Hash Function from Any Collision-Resistant FunctionThomas Ristenpart, Thomas Shrimpton. 147-163 [doi]
- Fully Anonymous Group Signatures Without Random OraclesJens Groth. 164-180 [doi]
- Group EncryptionAggelos Kiayias, Yiannis Tsiounis, Moti Yung. 181-199 [doi]
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysCécile Delerablée. 200-215 [doi]
- Boosting Merkle-Damgård Hashing for Message AuthenticationKan Yasuda. 216-231 [doi]
- On Efficient Message Authentication Via Block Cipher Design TechniquesGoce Jakimoski, K. P. Subbalakshmi. 232-248 [doi]
- Symmetric Key Cryptography on Modern Graphics HardwareJason Yang, James Goodman. 249-264 [doi]
- Blind Identity-Based Encryption and Simulatable Oblivious TransferMatthew Green, Susan Hohenberger. 265-282 [doi]
- Multi-party Indirect Indexing and ApplicationsMatthew K. Franklin, Mark Gondree, Payman Mohassel. 283-297 [doi]
- Two-Party Computing with Encrypted DataSeung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung. 298-314 [doi]
- Known-Key Distinguishers for Some Block CiphersLars R. Knudsen, Vincent Rijmen. 315-324 [doi]
- Generic Attacks on Unbalanced Feistel Schemes with Expanding FunctionsJacques Patarin, Valérie Nachef, Côme Berbain. 325-341 [doi]
- On Tweaking Luby-Rackoff BlockciphersDavid Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu. 342-356 [doi]
- Secure Protocols with Asymmetric TrustIvan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen. 357-375 [doi]
- Simple and Efficient Perfectly-Secure Asynchronous MPCZuzana Beerliová-Trubíniová, Martin Hirt. 376-392 [doi]
- Efficient Byzantine Agreement with Faulty MinorityZuzana Beerliová-Trubíniová, Martin Hirt, Micha Riser. 393-409 [doi]
- Information-Theoretic Security Without an Honest MajorityAnne Broadbent, Alain Tapp. 410-426 [doi]
- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way PermutationsUeli M. Maurer, Dominik Raub. 427-443 [doi]
- Concurrent Statistical Zero-Knowledge Arguments for NP from One Way FunctionsVipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai. 444-459 [doi]
- Anonymous Quantum CommunicationGilles Brassard, Anne Broadbent, Joseph Fitzsimons, Sébastien Gambs, Alain Tapp. 460-473 [doi]
- Authenticated Key Exchange and Key Encapsulation in the Standard ModelTatsuaki Okamoto. 474-484 [doi]
- Miniature CCA2 PK Encryption: Tight Security Without RedundancyXavier Boyen. 485-501 [doi]
- Bounded CCA2-Secure EncryptionRonald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan. 502-518 [doi]
- Relations Among Notions of Non-malleability for EncryptionRafael Pass, Abhi Shelat, Vinod Vaikuntanathan. 519-535 [doi]
- Cryptanalysis of the Tiger Hash FunctionFlorian Mendel, Vincent Rijmen. 536-550 [doi]
- Cryptanalysis of GrindahlThomas Peyrin. 551-567 [doi]
- A Key Recovery Attack on Edon80Martin Hell, Thomas Johansson. 568-581 [doi]