Abstract is missing.
- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 CompetitionBart Preneel. 1-14 [doi]
- Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity QueriesNigel P. Smart. 15-25 [doi]
- Efficient CRT-RSA Decryption for Small Encryption ExponentsSubhamoy Maitra, Santanu Sarkar. 26-40 [doi]
- Resettable Public-Key Encryption: How to Encrypt on a Virtual MachineScott Yilek. 41-56 [doi]
- Plaintext-Awareness of Hybrid EncryptionShaoquan Jiang, Huaxiong Wang. 57-72 [doi]
- Speed Records for NTRUJens Hermans, Frederik Vercauteren, Bart Preneel. 73-88 [doi]
- High-Speed Parallel Software Implementation of the ηT PairingDiego F. Aranha, Julio López, Darrel Hankerson. 89-105 [doi]
- Refinement of Miller s Algorithm Over Edwards CurvesLei Xu, Dongdai Lin. 106-118 [doi]
- Probabilistic Public Key Encryption with Equality TestGuomin Yang, Chik-How Tan, Qiong Huang, Duncan S. Wong. 119-131 [doi]
- Efficient CCA-Secure PKE from Identity-Based TechniquesJunzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou. 132-147 [doi]
- Anonymity from Asymmetry: New Constructions for Anonymous HIBELéo Ducas. 148-164 [doi]
- Making the Diffie-Hellman Protocol Identity-BasedDario Fiore, Rosario Gennaro. 165-178 [doi]
- On Extended Sanitizable Signature SchemesSébastien Canard, Amandine Jambert. 179-194 [doi]
- Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel AttacksShivam Bhasin, Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger. 195-207 [doi]
- Fault Attacks Against emv SignaturesJean-Sébastien Coron, David Naccache, Mehdi Tibouchi. 208-220 [doi]
- Revisiting Higher-Order DPA Attacks: Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede. 221-234 [doi]
- Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUsAndrey Bogdanov, Thomas Eisenbarth, Christof Paar, Malte Wienecke. 235-251 [doi]
- Usable Optimistic Fair ExchangeAlptekin Küpçü, Anna Lysyanskaya. 252-267 [doi]
- Hash Function Combiners in TLS and SSLMarc Fischlin, Anja Lehmann, Daniel Wagner. 268-283 [doi]
- Improving Efficiency of an ‘On the Fly Identification Scheme by Perfecting Zero-KnowledgenessBagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka. 284-301 [doi]
- Linear Cryptanalysis of Reduced-Round PRESENTJoo Yeon Cho. 302-317 [doi]
- Dependent Linear Approximations: The Algorithm of Biryukov and Others RevisitedMiia Hermelin, Kaisa Nyberg. 318-333 [doi]
- Practical Key Recovery Attack against Secret-IV Edon-Gaëtan Leurent. 334-349 [doi]
- Rebound Attacks on the Reduced Grøstl Hash FunctionFlorian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen. 350-365 [doi]
- The Sum of CBC MACs Is a Secure PRFKan Yasuda. 366-381 [doi]
- On Fast Verification of Hash ChainsDae Hyun Yum, Jin Seok Kim, Pil Joong Lee, Sung Je Hong. 382-396 [doi]