Abstract is missing.
- Linearization Attacks Against Syndrome Based HashesMarkku-Juhani Olavi Saarinen. 1-9 [doi]
- A Meet-in-the-Middle Collision Attack Against the New FORK-256Markku-Juhani Olavi Saarinen. 10-17 [doi]
- Multilane HMAC - Security beyond the Birthday LimitKan Yasuda. 18-32 [doi]
- On the Bits of Elliptic Curve Diffie-Hellman KeysDavid Jao, Dimitar Jetchev, Ramarathnam Venkatesan. 33-47 [doi]
- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve CryptographyV. N. Muralidhara, Sandeep Sen. 48-57 [doi]
- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the WeaknessesGautham Sekar, Souradyuti Paul, Bart Preneel. 58-72 [doi]
- Related-Key Differential-Linear Attacks on Reduced AES-192Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng. 73-85 [doi]
- Improved Meet-in-the-Middle Attacks on Reduced-Round DESOrr Dunkelman, Gautham Sekar, Bart Preneel. 86-100 [doi]
- Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and OptimalityKannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan. 101-122 [doi]
- Secret Swarm UnitReactive k-Secret SharingShlomi Dolev, Limor Lahiani, Moti Yung. 123-137 [doi]
- New Formulae for Efficient Elliptic Curve ArithmeticHüseyin Hisil, Gary Carter, Ed Dawson. 138-151 [doi]
- A Graph Theoretic Analysis of Double Base Number SystemsPradeep Kumar Mishra, Vassil S. Dimitrov. 152-166 [doi]
- Optimizing Double-Base Elliptic-Curve Single-Scalar MultiplicationDaniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters. 167-182 [doi]
- Transitive Signatures from Braid GroupsLicheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang. 183-196 [doi]
- Proxy Re-signature Schemes Without Random OraclesJun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang. 197-209 [doi]
- First-Order Differential Power Analysis on the Duplication MethodGuillaume Fumaroli, Emmanuel Mayer, Renaud Dubois. 210-223 [doi]
- Solving Discrete Logarithms from Partial Knowledge of the KeyK. Gopalakrishnan, Nicolas Thériault, Chui Zhi Yao. 224-237 [doi]
- New Description of SMS4 by an Embedding overGF(2:::8:::)Wen Ji, Lei Hu. 238-251 [doi]
- Tweakable Enciphering Schemes from Hash-Sum-ExpansionKazuhiko Minematsu, Toshiyasu Matsushima. 252-267 [doi]
- A Framework for Chosen IV Statistical Analysis of Stream CiphersHåkan Englund, Thomas Johansson, Meltem Sönmez Turan. 268-281 [doi]
- Public Key Encryption with Searchable Keywords Based on Jacobi SymbolsGiovanni Di Crescenzo, Vishal Saraswat. 282-296 [doi]
- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption PowerLihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura. 297-311 [doi]
- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic ResiduesMuxiang Zhang. 312-321 [doi]
- On the ::::k:::: -Operation Linear Complexity of Periodic SequencesRamakanth Kavuluru, Andrew Klapper. 322-330 [doi]
- Trade-Off Traitor TracingKazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai. 331-340 [doi]
- X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRsFrançois Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier. 341-350 [doi]
- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number SystemRana Barua, Sumit Kumar Pandey, Ravi Pankaj. 351-360 [doi]
- Extended Multi-Property-Preserving and ECM-ConstructionDuo Lei, Chao Li. 361-372 [doi]
- Design of a Differential Power Analysis Resistant Masked AES S-BoxKundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury. 373-383 [doi]
- LFSR Based Stream Ciphers Are Vulnerable to Power AttacksSanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan. 384-392 [doi]
- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash FunctionsPraveen Gauravaram, Katsuyuki Okeya. 393-403 [doi]
- Attacking the Filter Generator by Finding Zero Inputs of the Filtering FunctionFrédéric Didier. 404-413 [doi]
- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable HardwareCuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez. 414-424 [doi]