Abstract is missing.
- A Note on Semi-bent and Hyper-bent Boolean FunctionsChunming Tang, Yu Lou, Yanfeng Qi, MaoZhi Xu, Baoan Guo. 3-21 [doi]
- New Construction of Differentially 4-Uniform BijectionsClaude Carlet, Deng Tang, Xiaohu Tang, Qunying Liao. 22-38 [doi]
- Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential AttacksSiwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang. 39-51 [doi]
- On the Key-Stream Periods Probability of Edon80Yunqing Xu. 55-69 [doi]
- Cube Theory and Stable k -Error Linear Complexity for Periodic SequencesJianqin Zhou, Wanquan Liu, Guanglu Zhou. 70-85 [doi]
- Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pqXinxin Gong, Bin Zhang, Dengguo Feng, Tongjiang Yan. 86-98 [doi]
- Automatic Detection and Analysis of Encrypted Messages in MalwareRuoxu Zhao, Dawu Gu, Juanru Li, Yuanyuan Zhang. 101-117 [doi]
- EAdroid: Providing Environment Adaptive Security for Android SystemHongliang Liang, Yu Dong, Bin Wang, Shuchang Liu. 118-131 [doi]
- Supervised Usage of Signature Creation DevicesPrzemyslaw Kubiak, Miroslaw Kutylowski. 132-149 [doi]
- A Practical Attack on Patched MIFARE ClassicYi-Hao Chiu, Wei-Chih Hong, Li-Ping Chou, Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng. 150-164 [doi]
- Omega Pairing on Hyperelliptic CurvesShan Chen, Kunpeng Wang, Dongdai Lin, Tao Wang. 167-184 [doi]
- Pairing Computation on Edwards Curves with High-Degree TwistsLiangze Li, Hongfeng Wu, Fan Zhang. 185-200 [doi]
- The Gallant-Lambert-Vanstone Decomposition RevisitedZhi Hu, MaoZhi Xu. 201-216 [doi]
- Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR ProcessorsZhe Liu 0001, Johann Großschädl, Duncan S. Wong. 217-235 [doi]
- Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key AgreementLei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Sherman S. M. Chow, Wenchang Shi. 239-254 [doi]
- Security Model and Analysis of FHMQV, RevisitedShengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang, Yunlei Zhao. 255-269 [doi]
- RSA-OAEP is RKA SecureDingding Jia, Bao Li, Xianhui Lu, Yamin Liu. 270-281 [doi]
- A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT SchemeZhengjun Cao, Frédéric Lafitte, Olivier Markowitch. 282-288 [doi]
- LHash: A Lightweight Hash FunctionWenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong. 291-308 [doi]
- Cryptanalysis of the Round-Reduced GOST Hash FunctionJian Zou, Wenling Wu, Shuang Wu. 309-322 [doi]
- Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power TracesSuvadeep Hajra, Debdeep Mukhopadhyay. 325-342 [doi]
- Partially Known Nonces and Fault Injection Attacks on SM2 Signature AlgorithmMingjie Liu, Jiazhe Chen, Hexin Li. 343-358 [doi]
- Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML AssertionsKai Chen, Dongdai Lin, Li Yan, Xin Sun. 361-376 [doi]
- One-Time Programs with Limited MemoryKonrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac. 377-394 [doi]
- Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor NetworksXiaoqian Li, Peng Wang, Bao Li, Zhelei Sun. 395-406 [doi]