Abstract is missing.
- Cryptanalysis of a Generalized Unbalanced Feistel Network StructureRuilin Li, Bing Sun, Chao Li, Longjiang Qu. 1-18 [doi]
- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation SystemsKenneth Koon-Ho Wong, Gregory V. Bard. 19-36 [doi]
- On Multidimensional Linear CryptanalysisPhuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling. 37-52 [doi]
- Side-Channel Analysis of the K2 Stream CipherMatthew Henricksen, Wun-She Yap, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka. 53-73 [doi]
- On Unbiased Linear ApproximationsJonathan Etrog, Matthew J. B. Robshaw. 74-86 [doi]
- Distinguishers for the Compression Function and Output Transformation of Hamsi-256Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer. 87-103 [doi]
- Second-Preimage Analysis of Reduced SHA-1Christian Rechberger. 104-116 [doi]
- Some Observations on IndifferentiabilityEwan Fleischmann, Michael Gorski, Stefan Lucks. 117-134 [doi]
- Adaptive and Composable Non-committing EncryptionsHuafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai. 135-144 [doi]
- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random OraclesManuel Barbosa, Pooya Farshim. 145-163 [doi]
- Strong Knowledge Extractors for Public-Key Encryption SchemesManuel Barbosa, Pooya Farshim. 164-181 [doi]
- A Multi-trapdoor Commitment Scheme from the RSA AssumptionRyo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka. 182-199 [doi]
- Identity-Based Chameleon Hash Scheme without Key ExposureXiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim. 200-215 [doi]
- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature KeyJun Shao, Min Feng, Bin Zhu, Zhenfu Cao, Peng Liu. 216-232 [doi]
- Security Estimates for Quadratic Field Based CryptosystemsJean-François Biasse, Michael J. Jacobson, Alan K. Silvester. 233-247 [doi]
- Solving Generalized Small Inverse ProblemsNoboru Kunihiro. 248-263 [doi]
- One-Time-Password-Authenticated Key ExchangeKenneth G. Paterson, Douglas Stebila. 264-281 [doi]
- Predicate-Based Key ExchangeJames Birkett, Douglas Stebila. 282-299 [doi]
- Attribute-Based Authenticated Key ExchangeM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto. 300-317 [doi]
- Optimally Tight Security Proofs for Hash-Then-Publish Time-StampingAhto Buldas, Margus Niitsoo. 318-335 [doi]
- Additive Combinatorics and Discrete Logarithm Based Range ProtocolsRafik Chaabouni, Helger Lipmaa, Abhi Shelat. 336-351 [doi]
- Proof-of-Knowledge of Representation of Committed Value and Its ApplicationsMan Ho Au, Willy Susilo, Yi Mu. 352-369 [doi]
- Pattern Recognition Techniques for the Classification of Malware PackersLi Sun, Steven Versteeg, Serdar Boztas, Trevor Yann. 370-390 [doi]
- Repelling Sybil-Type Attacks in Wireless Ad Hoc SystemsMarek Klonowski, Michal Koza, Miroslaw Kutylowski. 391-402 [doi]