Abstract is missing.
- Algebraic Attacks on Clock-Controlled Stream CiphersSultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong. 1-16 [doi]
- Cache Based Power Analysis Attacks on AESJacques J. A. Fournier, Michael Tunstall. 17-28 [doi]
- Distinguishing Attack on SOBER-128 with Linear MaskingJoo Yeon Cho, Josef Pieprzyk. 29-39 [doi]
- Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic AttacksAn Braeken, Joseph Lano, Bart Preneel. 40-51 [doi]
- Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and BeyondMatthew Henricksen, Ed Dawson. 52-63 [doi]
- Improved Cryptanalysis of MAGLeonie Ruth Simpson, Matthew Henricksen. 64-75 [doi]
- On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power FunctionsNicolas Courtois, Blandine Debraize, Eric Garrido. 76-86 [doi]
- Augmented Certificate Revocation ListsAnantharaman Lakshminarayanan, Tong-Lee Lim. 87-98 [doi]
- Online/Offline Signatures and Multisignatures for AODV and DSR Routing SecurityShidi Xu, Yi Mu, Willy Susilo. 99-110 [doi]
- Towards an Invisible Honeypot Monitoring SystemAnh-Quynh Nguyen, Yoshiyasu Takefuji. 111-122 [doi]
- Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV ServiceKazuto Ogawa, Goichiro Hanaoka, Hideki Imai. 123-135 [doi]
- Fingercasting-Joint Fingerprinting and Decryption of Broadcast MessagesAndré Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi. 136-147 [doi]
- More on Stand-Alone and Setup-Free Verifiably Committed SignaturesHuafei Zhu, Feng Bao. 148-158 [doi]
- API Monitoring System for Defeating Worms and Exploits in MS-Windows SystemHung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu. 159-170 [doi]
- Hiding Circuit Topology from Unbounded Reverse EngineersYu Yu, Jussipekka Leiwo, Benjamin Premkumar. 171-182 [doi]
- The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware ApplicationsJohn W. Holford, William J. Caelli. 183-194 [doi]
- Efficient and Provably Secure Multi-receiver Identity-Based SigncryptionShanshan Duan, Zhenfu Cao. 195-206 [doi]
- Efficient Identity-Based Signatures Secure in the Standard ModelKenneth G. Paterson, Jacob C. N. Schuldt. 207-222 [doi]
- Event-Oriented ::::k::::-Times Revocable-iff-Linked Group SignaturesMan Ho Au, Willy Susilo, Siu-Ming Yiu. 223-234 [doi]
- Key Replacement Attack Against a Generic Construction of Certificateless SignatureBessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng. 235-246 [doi]
- A Novel Range TestKun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto. 247-258 [doi]
- Efficient Primitives from Exponentiation in Z::p::Shaoquan Jiang. 259-270 [doi]
- PA in the Two-Key Setting and a Generic Conversion for Encryption with AnonymityRyotaro Hayashi, Keisuke Tanaka. 271-282 [doi]
- Statistical Decoding RevisitedRaphael Overbeck. 283-294 [doi]
- Towards Provable Security for Ubiquitous ApplicationsMike Burmester, Tri Van Le, Breno de Medeiros. 295-312 [doi]
- Oblivious Scalar-Product ProtocolsHuafei Zhu, Feng Bao. 313-323 [doi]
- On Optimizing the ::::k::::-Ward Micro-aggregation Technique for Secure Statistical DatabasesEbaa Fayyoumi, B. John Oommen. 324-335 [doi]
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random OraclesEike Kiltz, David Galindo. 336-347 [doi]
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACTTakashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai. 348-359 [doi]
- Tag-KEM from Set Partial Domain One-Way PermutationsMasayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa. 360-370 [doi]
- An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term KeysColin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria. 371-382 [doi]
- Graphical Representation of Authorization Policies for Weighted CredentialsIsaac Agudo, Javier Lopez, José A. Montenegro. 383-394 [doi]
- Secure Cross-Realm C2C-PAKE ProtocolYin Yin, Li Bao. 395-406 [doi]
- Constructing Secure Hash Functions by Enhancing Merkle-Damgård ConstructionPraveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan. 407-420 [doi]
- Forgery and Key Recovery Attacks on PMAC and Mitchell s TMAC VariantChanghoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee. 421-431 [doi]
- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash FunctionsKatsuyuki Okeya. 432-443 [doi]