Abstract is missing.
- Secure Set Intersection with Untrusted Hardware TokensMarc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Ivan Visconti. 1-16 [doi]
- Efficient Secure Two-Party ExponentiationChing-Hua Yu, Sherman S. M. Chow, Kai-Min Chung, Feng-Hao Liu. 17-32 [doi]
- A General, Flexible and Efficient Proof of Inclusion and ExclusionKun Peng. 33-48 [doi]
- Non-interactive Confirmer SignaturesSherman S. M. Chow, Kristiyan Haralambiev. 49-64 [doi]
- Communication-Efficient 2-Round Group Key Establishment from PairingsKashi Neupane, Rainer Steinwandt. 65-76 [doi]
- Defeating RSA Multiply-Always and Message Blinding CountermeasuresMarc F. Witteman, Jasper G. J. van Woudenberg, Federico Menarini. 77-88 [doi]
- Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace PatternsChester Rebeiro, Debdeep Mukhopadhyay. 89-103 [doi]
- Improving Differential Power Analysis by Elastic AlignmentJasper G. J. van Woudenberg, Marc F. Witteman, Bram Bakker. 104-119 [doi]
- Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysAtsushi Fujioka, Koutarou Suzuki. 121-141 [doi]
- Contributory Password-Authenticated Group Key Exchange with Join CapabilityMichel Abdalla, Céline Chevalier, Louis Granboulan, David Pointcheval. 142-160 [doi]
- Ideal Key Derivation and Encryption in Simulation-Based SecurityRalf Küsters, Max Tuengerthal. 161-179 [doi]
- Beyond Provable Security Verifiable IND-CCA Security of OAEPGilles Barthe, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella Béguelin. 180-196 [doi]
- (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision ApproachLei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama. 197-212 [doi]
- MJH: A Faster Alternative to MDC-2Jooyoung Lee, Martijn Stam. 213-236 [doi]
- Online Ciphers from Tweakable BlockciphersPhillip Rogaway, Haibin Zhang. 237-249 [doi]
- Meet-in-the-Middle Attacks on Reduced-Round XTEAGautham Sekar, Nicky Mouha, Vesselin Velichkov, Bart Preneel. 250-267 [doi]
- Expedient Non-malleability Notions for Hash FunctionsPaul Baecher, Marc Fischlin, Dominique Schröder. 268-283 [doi]
- Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant ProtocolsDouglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Manuel González Nieto. 284-301 [doi]
- On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption SchemesJoonsang Baek, Cheng-Kang Chu, Jianying Zhou. 302-318 [doi]
- Better Key Sizes (and Attacks) for LWE-Based EncryptionRichard Lindner, Chris Peikert. 319-339 [doi]
- Binary Huff CurvesJulien Devigne, Marc Joye. 340-355 [doi]
- A Variant of the F4 AlgorithmAntoine Joux, Vanessa Vitse. 356-375 [doi]
- Attribute-Based SignaturesHemanta K. Maji, Manoj Prabhakaran, Mike Rosulek. 376-392 [doi]
- Sub-linear Size Traceable Ring Signatures without Random OraclesEiichiro Fujisaki. 393-415 [doi]