287 | -- | 0 | Jonathan Katz. Guest Editorial |
288 | -- | 303 | Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Public-key encryption indistinguishable under plaintext-checkable attacks |
304 | -- | 318 | Felix Heuer, Tibor Jager, Sven Schäge, Eike Kiltz. Selective opening security of practical public-key encryption schemes |
319 | -- | 331 | David Bernhard, Marc Fischlin, Bogdan Warinschi. Adaptive proofs of knowledge in the random oracle model |
332 | -- | 347 | Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. Divisible e-cash made practical |
348 | -- | 357 | Emmanuela Orsini, Joop van de Pol, Nigel P. Smart. q |
358 | -- | 371 | Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi. Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds |
372 | -- | 385 | Nico Döttling. Low Noise LPN: Key dependent message secure public key encryption an sample amplification |
386 | -- | 402 | Qutaiba Ibrahim Ali. Securing solar energy-harvesting road-side unit using an embedded cooperative-hybrid intrusion detection system |
403 | -- | 412 | Shifeng Sun, Shuai Han, Dawu Gu, Shengli Liu. Public key cryptosystems secure against memory leakage attacks |
413 | -- | 417 | Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang. Method for detecting text information leakage in electromagnetic radiation from a computer display |
418 | -- | 424 | Liang Deng, Qingkai Zeng. Exception-oriented programming: retrofitting code-reuse attacks to construct kernel malware |
425 | -- | 432 | Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li, Qingju Wang, Liang Song, Dawu Gu. -1 functions |
433 | -- | 441 | Yang Liu, Xiaojun Tong. Hyperchaotic system-based pseudorandom number generator |
442 | -- | 450 | Yanqing Yao, Zhoujun Li. Security of weak secrets based cryptographic primitives via the Rényi entropy |