Abstract is missing.
- Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption MechanismAmir Moradi, Markus Kasper, Christof Paar. 1-18 [doi]
- Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMsJosep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede. 19-34 [doi]
- Short Transitive Signatures for Directed TreesPhilippe Camacho, Alejandro Hevia. 35-50 [doi]
- Short Attribute-Based Signatures for Threshold PredicatesJavier Herranz, Fabien Laguillaumie, Benoît Libert, Carla Ràfols. 51-67 [doi]
- Reducing the Key Size of Rainbow Using Non-commutative RingsTakanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi. 68-83 [doi]
- A Duality in Space Usage between Left-to-Right and Right-to-Left ExponentiationColin D. Walter. 84-97 [doi]
- Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic CurvesDiego F. Aranha, Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals. 98-115 [doi]
- On the Joint Security of Encryption and Signature in EMVJean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler. 116-135 [doi]
- New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their ApplicationsEiichiro Fujisaki. 136-155 [doi]
- A First-Order Leak-Free Masking CountermeasureHoussem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger. 156-170 [doi]
- Practical Realisation and Elimination of an ECC-Related Software Bug AttackBilly Bob Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren. 171-186 [doi]
- A New Pseudorandom Generator from Collision-Resistant Hash FunctionsAlexandra Boldyreva, Virendra Kumar. 187-202 [doi]
- PMAC with Parity: Minimizing the Query-Length InfluenceKan Yasuda. 203-214 [doi]
- Boomerang Attacks on Hash Function Using Auxiliary DifferentialsGaëtan Leurent, Arnab Roy 0005. 215-230 [doi]
- Localized Electromagnetic Analysis of Cryptographic ImplementationsJohann Heyszl, Stefan Mangard, Benedikt Heinz, Frederic Stumpf, Georg Sigl. 231-244 [doi]
- Towards Different Flavors of Combined Side Channel AttacksYoussef Souissi, Shivam Bhasin, Sylvain Guilley, Maxime Nassar, Jean-Luc Danger. 245-259 [doi]
- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and MoreShota Yamada, Goichiro Hanaoka, Noboru Kunihiro. 260-277 [doi]
- Secure Computation, I/O-Efficient Algorithms and Distributed SignaturesIvan Damgård, Jonas Kölker, Tomas Toft. 278-295 [doi]
- Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of ComputationManuel Barbosa, Pooya Farshim. 296-312 [doi]
- Efficient RSA Key Generation and Threshold Paillier in the Two-Party SettingCarmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft. 313-331 [doi]
- Plaintext-Checkable EncryptionSébastien Canard, Georg Fuchsbauer, Aline Gouget, Fabien Laguillaumie. 332-348 [doi]
- Generic Construction of Chosen Ciphertext Secure Proxy Re-EncryptionGoichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda 0002, Jian Weng, Rui Zhang 0002, Yunlei Zhao. 349-364 [doi]
- A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage ModelsAnnelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger. 365-382 [doi]
- Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power AnalysisLejla Batina, Jip Hogenboom, Jasper G. J. van Woudenberg. 383-397 [doi]
- An Efficient Protocol for Oblivious DFA Evaluation and ApplicationsPayman Mohassel, Salman Niksefat, Seyed Saeed Sadeghian, Babak Sadeghiyan. 398-415 [doi]
- Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line MarketplacesSeung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein. 416-432 [doi]