Abstract is missing.
- Rotational Rebound Attacks on Reduced SkeinDmitry Khovratovich, Ivica Nikolic, Christian Rechberger. 1-19 [doi]
- Finding Second Preimages of Short Messages for Hamsi-256Thomas Fuhr. 20-37 [doi]
- Non-full-active Super-Sbox Analysis: Applications to ECHO and GrøstlYu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta. 38-55 [doi]
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang. 56-75 [doi]
- Collision Attacks against the Knudsen-Preneel Compression FunctionsOnur Özen, Martijn Stam. 76-93 [doi]
- Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding FunctionsEmmanuel Volte, Valérie Nachef, Jacques Patarin. 94-111 [doi]
- The World Is Not Enough: Another Look on Second-Order DPAFrançois-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard. 112-129 [doi]
- Conditional Differential Cryptanalysis of NLFSR-Based CryptosystemsSimon Knellwolf, Willi Meier, María Naya-Plasencia. 130-145 [doi]
- A Byte-Based Guess and Determine Attack on SOSEMANUKXiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu, Dengguo Feng. 146-157 [doi]
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256Orr Dunkelman, Nathan Keller, Adi Shamir. 158-176 [doi]
- Constant-Size Commitments to Polynomials and Their ApplicationsAniket Kate, Gregory M. Zaverucha, Ian Goldberg. 177-194 [doi]
- Computationally Secure Pattern Matching in the Presence of Malicious AdversariesCarmit Hazay, Tomas Toft. 195-212 [doi]
- Linear-Complexity Private Set Intersection Protocols Secure in Malicious ModelEmiliano De Cristofaro, Jihye Kim, Gene Tsudik. 213-231 [doi]
- Generic Compilers for Authenticated Key ExchangeTibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk. 232-249 [doi]
- A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPTEric Brier, Thomas Peyrin. 250-267 [doi]
- Efficient String-Commitment from Weak Bit-CommitmentKai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang. 268-282 [doi]
- On the Static Diffie-Hellman Problem on Elliptic Curves over Extension FieldsRobert Granger. 283-302 [doi]
- Random Oracles with(out) ProgrammabilityMarc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro. 303-320 [doi]
- Short Pairing-Based Non-interactive Zero-Knowledge ArgumentsJens Groth. 321-340 [doi]
- Short Non-interactive Zero-Knowledge ProofsJens Groth. 341-358 [doi]
- Optimistic Concurrent Zero KnowledgeAlon Rosen, Abhi Shelat. 359-376 [doi]
- Faster Fully Homomorphic EncryptionDamien Stehlé, Ron Steinfeld. 377-394 [doi]
- A Group Signature Scheme from Lattice AssumptionsS. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan. 395-412 [doi]
- Lattice-Based Blind SignaturesMarkus Rückert. 413-430 [doi]
- The Round Complexity of Verifiable Secret Sharing: The Statistical CaseRanjit Kumaresan, Arpita Patra, C. Pandu Rangan. 431-447 [doi]
- General Perfectly Secure Message Transmission Using Linear CodesQiushi Yang, Yvo Desmedt. 448-465 [doi]
- On Invertible Sampling and Adaptive SecurityYuval Ishai, Abishek Kumarasubramanian, Claudio Orlandi, Amit Sahai. 466-482 [doi]
- Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-DecompositionChao Ning, Qiuliang Xu. 483-500 [doi]
- A Closer Look at Anonymity and Robustness in Encryption SchemesPayman Mohassel. 501-518 [doi]
- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind SignaturesSarah Meiklejohn, Hovav Shacham, David Mandell Freeman. 519-538 [doi]
- The Semi-Generic Group Model and Applications to Pairing-Based CryptographyTibor Jager, Andy Rupp. 539-556 [doi]
- The Degree of Regularity of HFE SystemsVivien Dubois, Nicolas Gama. 557-576 [doi]
- Structured Encryption and Controlled DisclosureMelissa Chase, Seny Kamara. 577-594 [doi]
- Leakage Resilient ElGamal EncryptionEike Kiltz, Krzysztof Pietrzak. 595-612 [doi]
- Efficient Public-Key Cryptography in the Presence of Key LeakageYevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs. 613-631 [doi]