Abstract is missing.
- Using Templates to Attack Masked Montgomery Ladder Implementations of Modular ExponentiationChristoph Herbst, Marcel Medwed. 1-13 [doi]
- Template Attacks on ECDSAMarcel Medwed, Elisabeth Oswald. 14-27 [doi]
- Compact ASIC Architectures for the 512-Bit Hash Function WhirlpoolTakeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh. 28-40 [doi]
- Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor NetworkQingyu Xu, Mingxing He. 41-55 [doi]
- Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer ProtocolPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda. 56-68 [doi]
- Securing Layer-2 Path Selection in Wireless Mesh NetworksMd. Shariful Islam, Md. Abdul Hamid, Byung Goo Choi, Choong Seon Hong. 69-83 [doi]
- Public Key Authentication with Memory TokensCamille Vuillaume, Katsuyuki Okeya, Erik Dahmen, Johannes Buchmann. 84-98 [doi]
- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless SignaturesWei Wu, Yi Mu, Willy Susilo, Xinyi Huang. 99-114 [doi]
- Cryptanalysis of Mu et al. s and Li et al. s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) SchemeS. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan. 115-129 [doi]
- Sanitizable and Deletable SignatureTetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka. 130-144 [doi]
- An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted DataPeishun Wang, Huaxiong Wang, Josef Pieprzyk. 145-159 [doi]
- Extension of Secret Handshake Protocols with Multiple Groups in Monotone ConditionYutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta. 160-173 [doi]
- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512Hidenori Kuwakado, Shoichi Hirose. 174-189 [doi]
- A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive ModelSooyoung Chae, Hosub Lee, Jaeik Cho, Manhyun Jung, Jongin Lim, Jongsub Moon. 190-200 [doi]
- A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language SequenceJun-Hyung Park, Minsoo Kim, Bong-Nam Noh. 201-210 [doi]
- Image-Feature Based Human Identification Protocols on Limited Display DevicesHassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan Wei Wei, Syed Muhammad Khaliq-ur-rehman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes. 211-224 [doi]
- Ternary Subset Difference Method and Its Quantitative AnalysisKazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai. 225-239 [doi]
- Data Deletion with Provable SecurityMarek Klonowski, Michal Przykucki, Tomasz Struminski. 240-255 [doi]
- A Probing Attack on AESJörn-Marc Schmidt, Chong Hee Kim. 256-265 [doi]
- On Avoiding ZVP-Attacks Using Isogeny VolcanoesJosep M. Miret, D. Sadornil, J. Tena, R. Tomas, Magda Valls. 266-277 [doi]
- Security Analysis of DRBG Using HMAC in NIST SP 800-90Shoichi Hirose. 278-291 [doi]
- Compact Implementation of SHA-1 Hash Function for Mobile Trusted ModuleMooseop Kim, Jaecheol Ryou, SungIk Jun. 292-304 [doi]
- An Improved Distributed Key Management Scheme in Wireless Sensor NetworksJun Zhou, Mingxing He. 305-319 [doi]
- Protection Profile for Connected Interoperable DRM FrameworkDonghyun Choi, Sungkyu Cho, Dongho Won, Seungjoo Kim. 320-332 [doi]