Abstract is missing.
- Generic One Round Group Key Exchange in the Standard ModelM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis. 1-15 [doi]
- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key ExchangeMark Manulis, Koutarou Suzuki, Berkant Ustaoglu. 16-33 [doi]
- Efficient Certificateless KEM in the Standard ModelGeorg Lippold, Colin Boyd, Juan Manuel González Nieto. 34-46 [doi]
- Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairingYumi Sakemi, Shoichi Takeuchi, Yasuyuki Nogami, Yoshitaka Morikawa. 47-64 [doi]
- Factoring Unbalanced Moduli with Known BitsEric Brier, David Naccache, Mehdi Tibouchi. 65-72 [doi]
- Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack ComparedJeremy Erickson, Jintai Ding, Chris Christensen. 73-86 [doi]
- MXL::3::: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional IdealsMohamed Saied Emam Mohamed, Daniel Cabarcas, Jintai Ding, Johannes Buchmann, Stanislav Bulygin. 87-100 [doi]
- Improved Linear Cryptanalysis of SOSEMANUKJoo Yeon Cho, Miia Hermelin. 101-117 [doi]
- Serial Model for Attack Tree ComputationsAivo Jürgenson, Jan Willemson. 118-128 [doi]
- Lightweight Cryptography and RFID: Tackling the Hidden OverheadsAxel Poschmann, Matthew J. B. Robshaw, Frank Vater, Christof Paar. 129-145 [doi]
- Power Analysis of Single-Rail Storage Elements as Used in MDPLAmir Moradi, Thomas Eisenbarth, Axel Poschmann, Christof Paar. 146-160 [doi]
- A Timing Attack against Patterson Algorithm in the McEliece PKCAbdulhadi Shoufan, Falko Strenzke, H. Gregor Molter, Marc Stöttinger. 161-175 [doi]
- Side-Channel Analysis of Cryptographic Software via Early-Terminating MultiplicationsJohann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall. 176-192 [doi]
- First CPIR Protocol with Data-Dependent ComputationHelger Lipmaa. 193-210 [doi]
- Efficient Fuzzy Matching and Intersection on Private DatasetsQingsong Ye, Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang. 211-228 [doi]
- Efficient Privacy-Preserving Face RecognitionAhmad-Reza Sadeghi, Thomas Schneider 0003, Immo Wehrenberg. 229-244 [doi]
- Linear, Constant-Rounds Bit-DecompositionTord Reistad, Tomas Toft. 245-257 [doi]
- Attacking and Repairing the Improved ModOnions ProtocolNikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka. 258-273 [doi]
- Secret Handshakes with Revocation SupportAlessandro Sorniotti, Refik Molva. 274-299 [doi]
- Practical Rebound Attack on 12-Round Cheetah-256Shuang Wu, Dengguo Feng, Wenling Wu. 300-314 [doi]
- Preimage Attacks on Reduced Steps of ARIRANG and PKC98-HashDeukjo Hong, Bonwook Koo, Woo-Hwan Kim, Daesung Kwon. 315-331 [doi]
- Improved Preimage Attack for 68-Step HAS-160Deukjo Hong, Bonwook Koo, Yu Sasaki. 332-348 [doi]
- Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1Siyuan Qiao, Wei Wang, Keting Jia. 349-361 [doi]
- Cryptanalysis of a Message Recognition Protocol by Mashatan and StinsonMadeline González Muñiz, Rainer Steinwandt. 362-373 [doi]
- Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network BandwidthKwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young Ik Eom. 374-385 [doi]