Abstract is missing.
- Erratum: An Enhanced Anonymous Authentication and Key Exchange Scheme Using SmartcardKyung-kug Kim, Myung-Hwan Kim. [doi]
- ML Confidential: Machine Learning on Encrypted DataThore Graepel, Kristin Lauter, Michael Naehrig. 1-21 [doi]
- Another Look at Affine-Padding RSA SignaturesJean-Sébastien Coron, David Naccache, Mehdi Tibouchi. 22-32 [doi]
- On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric CryptanalysisChristian Rechberger. 33-36 [doi]
- Balanced Indexing Method for Efficient Intrusion Detection SystemsBoojoong Kang, Hye Seon Kim, Ji Su Yang, Eul-Gyu Im. 37-48 [doi]
- Quantitative Questions on Attack-Defense TreesBarbara Kordy, Sjouke Mauw, Patrick Schweitzer. 49-64 [doi]
- DNS Tunneling for Network PenetrationDaan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout. 65-77 [doi]
- MeadDroid: Detecting Monetary Theft Attacks in Android by DVM MonitoringLingguang Lei, Yuewu Wang, Jiwu Jing, Zhongwen Zhang, Xingjie Yu. 78-91 [doi]
- iBinHunt: Binary Hunting with Inter-procedural Control FlowJiang Ming, Meng Pan, Debin Gao. 92-109 [doi]
- Sometimes It's Better to Be STUCK! SAML Transportation Unit for Cryptographic KeysChristopher Meyer, Florian Feldmann, Jörg Schwenk. 110-125 [doi]
- Improved Impossible Differential Attacks on Large-Block RijndaelQingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu 0001, Jiazhe Chen, Andrey Bogdanov. 126-140 [doi]
- Cube Cryptanalysis of LBlock with Noisy LeakageZhenqi Li, Bin Zhang, Yuan Yao, Dongdai Lin. 141-155 [doi]
- Comprehensive Study of Integral Analysis on 22-Round LBlockYu Sasaki, Lei Wang 0007. 156-169 [doi]
- New Impossible Differential Attack on SAFER + and SAFER + +Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng. 170-183 [doi]
- An Information-Theoretically Secure Threshold Distributed Oblivious Transfer ProtocolChristian L. F. Corniaux, Hossein Ghodosi. 184-201 [doi]
- Practically Efficient Multi-party Sorting Protocols from Comparison Sort AlgorithmsKoki Hamada, Ryo Kikuchi, Dai Ikarashi, Koji Chida, Katsumi Takahashi. 202-216 [doi]
- Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement ProtocolLei Zhang. 217-230 [doi]
- A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random OraclesKaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang. 231-246 [doi]
- Ciphertext Policy Multi-dimensional Range EncryptionKohei Kasamatsu, Takahiro Matsuda 0002, Goichiro Hanaoka, Hideki Imai. 247-261 [doi]
- Speeding Up Ate Pairing Computation in Affine CoordinatesDuc-Phong Le, Chik-How Tan. 262-277 [doi]
- An Improved Hardware Implementation of the Grain-128a Stream CipherShohreh Sharif Mansouri, Elena Dubrova. 278-292 [doi]
- Optimized GPU Implementation and Performance Analysis of HC Series of Stream CiphersAyesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay. 293-308 [doi]
- Trusted Launch of Virtual Machine Instances in Public IaaS EnvironmentsNicolae Paladi, Christian Gehrmann, Mudassar Aslam, Fredric Morenius. 309-323 [doi]
- Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual MachinesMichael Velten, Frederic Stumpf. 324-336 [doi]
- Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaChaZhenqing Shi, Bin Zhang 0003, Dengguo Feng, Wenling Wu. 337-351 [doi]
- Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential PropertiesTakuma Koyama, Yu Sasaki, Noboru Kunihiro. 352-367 [doi]
- Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like CiphersMohamed Ahmed Abdelraheem. 368-382 [doi]
- Security Evaluation of Cryptographic Modules against Profiling AttacksYongdae Kim, Naofumi Homma, Takafumi Aoki, Heebong Choi. 383-394 [doi]
- Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision DistinguisherToshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama. 395-409 [doi]
- Efficient Group Signatures in the Standard ModelLaila El Aimani, Olivier Sanders. 410-424 [doi]
- Batch Verification Suitable for Efficiently Verifying a Limited Number of SignaturesKeisuke Hakuta, Yosuke Katoh, Hisayoshi Sato, Tsuyoshi Takagi. 425-440 [doi]
- Linear Recurring Sequences for the UOV Key Generation RevisitedAlbrecht Petzoldt, Stanislav Bulygin. 441-455 [doi]
- Galindo-Garcia Identity-Based Signature RevisitedSanjit Chatterjee, Chethan Kamath, Vikas Kumar. 456-471 [doi]
- Private Over-Threshold Aggregation ProtocolsMyungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim. 472-486 [doi]
- An Enhanced Anonymous Authentication and Key Exchange Scheme Using SmartcardKyung-kug Kim, Myung-Hwan Kim. 487-494 [doi]
- Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential SystemNasima Begum, Toru Nakanishi, Nobuo Funabiki. 495-509 [doi]