Abstract is missing.
- Cryptanalysis of a Hash Function Proposed at ICISC 2006Willi Geiselmann, Rainer Steinwandt. 1-10 [doi]
- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006Jiqiang Lu. 11-26 [doi]
- A Cryptanalysis of the Double-Round Quadratic CryptosystemAntoine Scemama. 27-36 [doi]
- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing EnvironmentJangseong Kim, Zeen Kim, Kwangjo Kim. 37-48 [doi]
- Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain EnvironmentsJinwei Hu, Ruixuan Li, Zhengding Lu. 49-63 [doi]
- Handling Dynamic Information ReleaseLi Jiang, Lingdi Ping, Xuezeng Pan. 64-76 [doi]
- Improving the Time Complexity of Matsui s Linear CryptanalysisBaudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater. 77-88 [doi]
- On Large Distributions for Linear CryptanalysisAlexander Maximov. 89-101 [doi]
- Passive Attacks on a Class of Authentication Protocols for RFIDBasel Alomair, Loukas Lazos, Radha Poovendran. 102-115 [doi]
- Side Channel Attacks on Irregularly Decimated GeneratorsChuan-Wen Loe, Khoongming Khoo. 116-130 [doi]
- Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel ModuleRuo Ando, Youki Kadobayashi, Yoichi Shinoda. 131-143 [doi]
- Filesystem Activity Following a SSH Compromise: An Empirical Study of File SequencesJesus Molina, Xavier Chorin, Michel Cukier. 144-155 [doi]
- A Secure Virtual Execution Environment for Untrusted CodeYan Wen, Huaimin Wang. 156-167 [doi]
- Liveness Detection of Fingerprint Based on Band-Selective Fourier SpectrumChanglong Jin, Hakil Kim, Stephen J. Elliott. 168-179 [doi]
- Improving Upon the TET Mode of OperationPalash Sarkar. 180-192 [doi]
- New Local Collisions for the SHA-2 Hash FamilySomitra Kumar Sanadhya, Palash Sarkar. 193-205 [doi]
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVALHongbo Yu, Xiaoyun Wang. 206-226 [doi]
- Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4Haina Zhang, Xiaoyun Wang. 227-238 [doi]
- New Results on Impossible Differential Cryptanalysis of Reduced AESWentao Zhang, Wenling Wu, Dengguo Feng. 239-250 [doi]
- A Note About the Traceability Properties of Linear CodesMarcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo. 251-258 [doi]
- Power Analysis Attacks on MDPL and DRSL ImplementationsAmir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani. 259-272 [doi]
- Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular MultiplierChong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee. 273-281 [doi]
- Generalized MMM-Algorithm Secure Against SPA, DPA, and RPAAtsuko Miyaji. 282-296 [doi]
- Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon s AlgorithmAya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi. 297-308 [doi]
- Analysis of Multivariate Hash FunctionsJean-Philippe Aumasson, Willi Meier. 309-323 [doi]
- Colliding Message Pair for 53-Step HAS-160Florian Mendel, Vincent Rijmen. 324-334 [doi]
- Weaknesses in the HAS-V Compression FunctionFlorian Mendel, Vincent Rijmen. 335-345 [doi]
- Security-Preserving Asymmetric Protocol EncapsulationRaphael C.-W. Phan, Serge Vaudenay. 346-366 [doi]