Abstract is missing.
- Laudatio in Honour of Professor Dr. Johannes Buchmann on the Occasion of His 60th BirthdayHugh C. Williams. 1-2 [doi]
- Have a Break - Have a Security Centre: From DZI to CASEDHarald Baier. 3-18 [doi]
- Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of VariablesJenny Yuan-Chun Yeh, Chen-Mou Cheng, Bo-Yin Yang. 19-33 [doi]
- Solving Degree and Degree of Regularity for Polynomial Systems over a Finite FieldsJintai Ding, Dieter Schmidt. 34-49 [doi]
- Shorter Compact Representations in Real Quadratic FieldsAlan K. Silvester, Michael J. Jacobson Jr., Hugh C. Williams. 50-72 [doi]
- Factoring Integers by CVP AlgorithmsClaus-Peter Schnorr. 73-93 [doi]
- Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods - An Experimental StudyMichael Shantz, Edlyn Teske. 94-107 [doi]
- An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12)Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi. 108-120 [doi]
- Universal Security - From Bits and Mips to Pools, Lakes - and BeyondArjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé. 121-124 [doi]
- Identities for Embedded Systems Enabled by Physical Unclonable FunctionsDominik Merli, Georg Sigl, Claudia Eckert. 125-138 [doi]
- When Should an Implementation Attack Be Viewed as Successful?Werner Schindler. 139-150 [doi]
- AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation FrameworkSorin A. Huss, Marc Stöttinger, Michael Zohner. 151-165 [doi]
- A Performance Boost for Hash-Based SignaturesThomas Eisenbarth, Ingo von Maurich, Christof Paar, Xin Ye. 166-182 [doi]
- Privacy-Preserving Reconciliation Protocols: From Theory to PracticeUlrike Meyer, Susanne Wetzel. 183-210 [doi]
- Defining Privacy Based on Distributions of Privacy BreachesMatthias Huber, Jörn Müller-Quade, Tobias Nilges. 211-225 [doi]
- A Constructive Perspective on Key EncapsulationSandro Coretti, Ueli Maurer, Björn Tackmann. 226-239 [doi]
- Why Are Business Processes Not Secure?Günter Müller, Rafael Accorsi. 240-254 [doi]
- Mental Models - General Introduction and Review of Their Application to Human-Centred SecurityMelanie Volkamer, Karen Renaud. 255-280 [doi]