Abstract is missing.
- Model-Based Conformance Testing for AndroidYiming Jing, Gail-Joon Ahn, Hongxin Hu. 1-18 [doi]
- Application of Scalar Multiplication of Edwards Curves to Pairing-Based CryptographyTakanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai. 19-36 [doi]
- Standardized Signature Algorithms on Ultra-constrained 4-Bit MCUChien-Ning Chen, Nisha Jacob, Sebastian Kutzner, San Ling, Axel Poschmann, Sirote Saetang. 37-50 [doi]
- Very Short Critical Path Implementation of AES with Direct Logic GatesKenta Nekado, Yasuyuki Nogami, Kengo Iokibe. 51-68 [doi]
- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained AdversaryKazuki Yoneyama. 69-86 [doi]
- Compact Stateful Encryption Schemes with Ciphertext VerifiabilityS. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan. 87-104 [doi]
- Structured Encryption for Conceptual GraphsGeong Sen Poh, Moesfa Soeheila Mohamad, Muhammad Reza Z'aba. 105-122 [doi]
- Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleabilityAkinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka. 123-137 [doi]
- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHITakanori Isobe, Toshihiro Ohigashi, Masakatu Morii. 138-155 [doi]
- Boomerang Distinguishers for Full HAS-160 Compression FunctionYu Sasaki, Lei Wang 0007, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta. 156-169 [doi]
- Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash FunctionLei Wang 0007, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta. 170-181 [doi]
- Annihilators of Fast Discrete Fourier Spectra AttacksJingjing Wang, Kefei Chen, Shixiong Zhu. 182-196 [doi]
- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block CipherJiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-Alain Fouque. 197-215 [doi]
- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation SecuritySusumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto. 216-232 [doi]
- Efficient Secure Primitive for Privacy Preserving Distributed ComputationsYouwen Zhu, Tsuyoshi Takagi, Liusheng Huang. 233-243 [doi]
- Generic Construction of GUC Secure Commitment in the KRK ModelItsuki Suzuki, Maki Yoshida, Toru Fujiwara. 244-260 [doi]