Abstract is missing.
- Secure Log Transfer by Replacing a Library in a Virtual MachineMasaya Sato, Toshihiro Yamauchi. 1-18 [doi]
- Static Integer Overflow Vulnerability Detection in Windows BinaryYi Deng, Yang Zhang, Liang Cheng, Xiaoshan Sun. 19-35 [doi]
- Solving Google's Continuous Audio CAPTCHA with HMM-Based Automatic Speech RecognitionShotaro Sano, Takuma Otsuka, Hiroshi G. Okuno. 36-52 [doi]
- Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability SpacesJosé Moreira, Marcel Fernandez, Grigory Kabatiansky. 53-67 [doi]
- Differential Power Analysis of MAC-Keccak at Any Key-LengthMostafa M. I. Taha, Patrick Schaumont. 68-82 [doi]
- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMACYusuke Naito, Yu Sasaki, Lei Wang, Kan Yasuda. 83-98 [doi]
- New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFAYosuke Todo, Yu Sasaki. 99-114 [doi]
- Improvement of Faugère et al.'s Method to Solve ECDLPYun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi. 115-132 [doi]
- Statistics on Encrypted Cloud DataFu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen, Bao-Shuh Paul Lin. 133-150 [doi]
- Toward Practical Searchable Symmetric EncryptionWakaha Ogata, Keita Koiwa, Akira Kanaoka, Shin'ichiro Matsuo. 151-167 [doi]
- Unconditionally Secure Oblivious Transfer from Real Network BehaviorPaolo Palmieri, Olivier Pereira. 168-182 [doi]
- Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic EncryptionTakato Hirano, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda. 183-200 [doi]
- Efficient Algorithm for Tate Pairing of Composite OrderYutaro Kiyomura, Tsuyoshi Takagi. 201-216 [doi]
- How to Factor N 1 and N 2 When $p_1=p_2 \bmod 2^t$Kaoru Kurosawa, Takuma Ueda. 217-225 [doi]
- Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid EncryptionTakahiro Matsuda 0002, Goichiro Hanaoka. 226-243 [doi]
- Cryptanalysis of the Quaternion RainbowYasufumi Hashimoto. 244-257 [doi]
- On Cheater Identifiable Secret Sharing Schemes Secure against Rushing AdversaryRui Xu, Kirill Morozov, Tsuyoshi Takagi. 258-271 [doi]
- One-Round Authenticated Key Exchange without Implementation TrickKazuki Yoneyama. 272-289 [doi]
- Attacks to the Proxy Re-Encryption Schemes from IWSEC2011Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka. 290-302 [doi]
- Game-Theoretic Security for Bit CommitmentHaruna Higo, Keisuke Tanaka, Kenji Yasunaga. 303-318 [doi]