Abstract is missing.
- Cryptanalysis of Reduced-Round MIBS Block CipherAsli Bay, Jorge Nakahara, Serge Vaudenay. 1-19 [doi]
- Impossible Differential Cryptanalysis of ARIA Reduced to 7 RoundsChenghang Du, Jiazhe Chen. 20-30 [doi]
- An Algorithm Based Concurrent Error Detection Scheme for AESChang N. Zhang, Qian Yu, Xiao Wei Liu. 31-42 [doi]
- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)Kaoru Kurosawa. 43 [doi]
- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile DevicesJohann Großschädl, Ilya Kizhvatov. 44-61 [doi]
- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMPMartin Eian. 62-75 [doi]
- User Tracking Based on Behavioral FingerprintsGünther Lackner, Peter Teufl, Roman Weinberger. 76-95 [doi]
- On the Collision and Preimage Resistance of Certain Two-Call Hash FunctionsNasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen. 96-105 [doi]
- Integral Distinguishers of Some SHA-3 CandidatesMarine Minier, Raphael C.-W. Phan, Benjamin Pousse. 106-123 [doi]
- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKEBozhan Su, Wenling Wu, Shuang Wu, Le Dong. 124-139 [doi]
- Practical Algebraic Cryptanalysis for Dragon-Based CryptosystemsJohannes Buchmann, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner. 140-155 [doi]
- Generating Parameters for Algebraic Torus-Based CryptosystemsTomoko Yonemura, Yoshikazu Hanatani, Taichi Isogai, Kenji Ohkuma, Hirofumi Muratani. 156-168 [doi]
- Analysis of the MQQ Public Key CryptosystemJean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski. 169-183 [doi]
- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk)Ahmad-Reza Sadeghi. 199-200 [doi]
- Towards a Cryptographic Treatment of Publish/Subscribe SystemsTsz Hon Yuen, Willy Susilo, Yi Mu. 201-220 [doi]
- STE3D-CAP: Stereoscopic 3D CAPTCHAWilly Susilo, Yang-Wai Chow, Hua-Yu Zhou. 221-240 [doi]
- TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding MechanismHaifeng Fang, Hui Wang, Yiqiang Zhao, Yuzhong Sun, Zhiyong Liu. 241-260 [doi]
- Dynamic Group Key Exchange RevisitedGuomin Yang, Chik-How Tan. 261-277 [doi]
- Towards Practical and Secure Coercion-Resistant Electronic ElectionsRoberto Araujo, Narjes Ben Rajeb, Riadh Robbana, Jacques Traoré, Souheib Yousfi. 278-297 [doi]
- Predicate Encryption with Partial Public KeysCarlo Blundo, Vincenzo Iovino, Giuseppe Persiano. 298-313 [doi]
- Anonymous Credential Schemes with Encrypted AttributesJorge Guajardo, Bart Mennink, Berry Schoenmakers. 314-333 [doi]
- One Time Anonymous Certificate: X.509 Supporting AnonymityAymen Abed, Sébastien Canard. 334-353 [doi]