Abstract is missing.
- A Pre-computable Signature Scheme with Efficient Verification for RFIDFuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan. 1-16 [doi]
- Redactable Signatures for Independent Removal of Structure and ContentKai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer. 17-33 [doi]
- Improved Efficiency of Chosen Ciphertext Secure Encryption from FactoringXianhui Lu, Bao Li, Qixiang Mei, Yamin Liu. 34-45 [doi]
- Deniable Encryptions Secure against Adaptive Chosen Ciphertext AttackChong-zhi Gao, Dongqing Xie, Baodian Wei. 46-62 [doi]
- Computational Soundness of Indistinguishability Properties without Computable ParsingHubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, Hideki Sakurada. 63-79 [doi]
- New Impossible Differential Attacks on CamelliaDongxia Bai, Leibo Li. 80-96 [doi]
- Impossible Differential Attacks on Reduced-Round LBlockYa Liu 0001, Dawu Gu, Zhiqiang Liu, Wei Li 0013. 97-108 [doi]
- New Truncated Differential Cryptanalysis on 3D Block CipherTakuma Koyama, Lei Wang 0007, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta. 109-125 [doi]
- T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive SettingsChristian L. F. Corniaux, Hossein Ghodosi. 126-143 [doi]
- A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece AssumptionsK. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan. 144-157 [doi]
- Towards Fine-Grained Access Control on Browser ExtensionsLei Wang, Ji Xiang, Jiwu Jing, Lingchen Zhang. 158-169 [doi]
- Enhanced STE3D-CAP: A Novel 3D CAPTCHA FamilyYang-Wai Chow, Willy Susilo. 170-181 [doi]
- High-Entropy Visual Identification for Touch Screen DevicesNathaniel Wesley Filardo, Giuseppe Ateniese. 182-198 [doi]
- A Framework for Security Analysis of Key Derivation FunctionsChuah Chai Wen, Ed Dawson, Juan Manuel González Nieto, Leonie Simpson. 199-216 [doi]
- On the Equivalence of Two Definitions of Visual Cryptography SchemeTeng Guo, Feng Liu, Chuan-Kun Wu. 217-227 [doi]
- Key Length Estimation of Pairing-Based Cryptosystems Using η T PairingNaoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi. 228-244 [doi]
- Lightweight Integrity for XOR Network Coding in Wireless Sensor NetworksKazuya Izawa, Atsuko Miyaji, Kazumasa Omote. 245-258 [doi]
- iPIN and mTAN for Secure eID ApplicationsJohannes Braun 0001, Moritz Horsch, Alexander Wiesmaier. 259-276 [doi]
- Secure Distributed Computation of the Square Root and ApplicationsManuel Liedel. 277-288 [doi]
- Prevent Kernel Return-Oriented Programming Attacks Using Hardware VirtualizationShuo Tian, Yeping He, Baozeng Ding. 289-300 [doi]
- Structure-Based RSA Fault AttacksBenjamin Michéle, Juliane Krämer, Jean-Pierre Seifert. 301-318 [doi]
- Fault Analysis of the KATAN Family of Block CiphersShekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry. 319-336 [doi]
- Biclique Cryptanalysis of Reduced-Round Piccolo Block CipherYanfeng Wang, Wenling Wu, Xiaoli Yu. 337-352 [doi]
- On the CCA-1 Security of Somewhat Homomorphic Encryption over the IntegersZhenfei Zhang, Thomas Plantard, Willy Susilo. 353-368 [doi]
- Partial Key Exposure on RSA with Private Exponents Larger Than NMarc Joye, Tancrède Lepoint. 369-380 [doi]
- Linear Cryptanalysis of Reduced-Round ICEBERGYue Sun, Meiqin Wang. 381-392 [doi]
- Overcoming Significant Noise: Correlation-Template-Induction Attackan Wang, Man Chen, Zongyue Wang, Yaoling Ding. 393-404 [doi]