Abstract is missing.
- Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINEYanfeng Wang, Wenling Wu. 1-16 [doi]
- Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1Bungo Taga, Shiho Moriai, Kazumaro Aoki. 17-33 [doi]
- Some Insights into Differential Cryptanalysis of Grain v1Subhadeep Banik. 34-49 [doi]
- On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree EquationsPetr Susil, Pouyan Sepehrdad, Serge Vaudenay. 50-65 [doi]
- Strongly Simulation-Extractable Leakage-Resilient NIZKYuyu Wang, Keisuke Tanaka. 66-81 [doi]
- A Secure Three-Party Computational Protocol for Triangle AreaLiang Liu, Xiaofeng Chen 0001, Wenjing Lou. 82-97 [doi]
- Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership EncryptionPratish Datta, Ratna Dutta, Sourav Mukhopadhyay. 98-114 [doi]
- TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud StorageZheli Liu, Jin Li, Xiaofeng Chen 0001, Jun Yang, Chunfu Jia. 115-130 [doi]
- Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage SetsXiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu. 131-147 [doi]
- A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012Yanbin Pan, Yingpu Deng. 148-161 [doi]
- Further Research on N-1 Attack against Exponentiation AlgorithmsZhaojing Ding, Wei Guo, Liangjian Su, Jizeng Wei, Haihua Gu. 162-175 [doi]
- Cryptanalysis of RSA with Multiple Small Secret ExponentsAtsushi Takayasu, Noboru Kunihiro. 176-191 [doi]
- New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-RevocationMingwu Zhang. 192-208 [doi]
- Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard ModelY. Sreenivasa Rao, Ratna Dutta. 209-225 [doi]
- Incrementally Executable SigncryptionsDan Yamamoto, Hisayoshi Sato, Yasuko Fukuzawa. 226-241 [doi]
- Hierarchical Identity-Based Broadcast EncryptionWeiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin. 242-257 [doi]
- Continuous After-the-Fact Leakage-Resilient Key ExchangeJanaka Alawatugoda, Colin Boyd, Douglas Stebila. 258-273 [doi]
- Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, RevisitedYu Chen, Qiong Huang, Zongyang Zhang. 274-289 [doi]
- On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA AssumptionMasayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya. 290-305 [doi]
- ELmE: A Misuse Resistant Parallel Authenticated EncryptionNilanjan Datta, Mridul Nandi. 306-321 [doi]
- Lattice Decoding Attacks on Binary LWEShi Bai, Steven D. Galbraith. 322-337 [doi]
- Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic EncryptionMasaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba. 338-353 [doi]
- Once Root Always a Threat: Analyzing the Security Threats of Android Permission SystemZhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei. 354-369 [doi]
- A High-Throughput Unrolled ZUC Core for 100Gbps Data TransmissionQinglong Zhang, Zongbin Liu, Miao Li, Ji Xiang, Jiwu Jing. 370-385 [doi]
- Another Look at Privacy Threats in 3G Mobile TelephonyMohammed Shafiul Alam Khan, Chris J. Mitchell. 386-396 [doi]
- ExBLACR: Extending BLACR SystemWeijin Wang, Dengguo Feng, Yu Qin, Jianxiong Shao, Li Xi, XiaoBo Chu. 397-412 [doi]
- A Semantics-Aware Classification Approach for Data Leakage PreventionSultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy. 413-421 [doi]
- Route 66: Passively Breaking All GSM ChannelsPhilip S. Vejre, Andrey Bogdanov. 422-429 [doi]
- An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 SmartphonesYogachandran Rahulamathavan, Veelasha Moonsamy, Lynn Margaret Batten, Su Shunliang, Muttukrishnan Rajarajan. 430-437 [doi]
- Running Multiple Androids on One ARM PlatformZhijiao Zhang, Lei Zhang, Yu Chen, Yuanchun Shi. 438-445 [doi]
- CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in AndroidXingmin Cui, Da Yu, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu, Sihan Qing. 446-453 [doi]
- Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2Long Wen, Meiqin Wang. 454-461 [doi]