Abstract is missing.
- Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved EfficiencyPuwen Wei, Wei Wang, Bingxin Zhu, Siu-Ming Yiu. 3-22 [doi]
- Hierarchical Functional Encryption for Linear TransformationsShiwei Zhang, Yi Mu, Guomin Yang, Xiaofen Wang. 23-43 [doi]
- KDM-Secure Public-Key Encryption from Constant-Noise LPNShuai Han, Shengli Liu. 44-64 [doi]
- Long-Term Secure Commitments via Extractable-Binding CommitmentsAhto Buldas, Matthias Geihs, Johannes A. Buchmann. 65-81 [doi]
- New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based EncryptionKatsuyuki Takashima. 85-105 [doi]
- Attribute-Based Encryption with Expressive and Authorized Keyword SearchHui Cui, Robert H. Deng, Joseph K. Liu, Yingjiu Li. 106-126 [doi]
- Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon CloudYanjiang Yang, Joseph Liu, Zhuo Wei, Xinyi Huang. 127-144 [doi]
- Mergeable and Revocable Identity-Based EncryptionShengmin Xu, Guomin Yang, Yi Mu, Willy Susilo. 147-167 [doi]
- ID-Based Encryption with Equality Test Against Insider AttackTong Wu, Sha Ma, Yi Mu, Shengke Zeng. 168-183 [doi]
- Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure ResistanceAtsushi Takayasu, Yohei Watanabe 0001. 184-204 [doi]
- Dynamic Searchable Symmetric Encryption with Physical Deletion and Small LeakagePeng Xu, Shuai Liang, Wei Wang 0088, Willy Susilo, Qianhong Wu, Hai Jin. 207-226 [doi]
- Multi-user Cloud-Based Secure Keyword SearchShabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld. 227-247 [doi]
- Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud ComputingHong Zhu, Zhuolin Mei, Bing Wu, Hongbo Li, Zongmin Cui. 248-265 [doi]
- Secure and Practical Searchable Encryption: A Position PaperShujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello. 266-281 [doi]
- Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption ModesHassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong. 285-305 [doi]
- How to Handle Rainbow Tables with External MemoryGildas Avoine, Xavier Carpent, Barbara Kordy, Florent Tardif. 306-323 [doi]
- Improved Factoring Attacks on Multi-prime RSA with Small Prime DifferenceMengce Zheng, Noboru Kunihiro, Honggang Hu. 324-342 [doi]
- Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKESuvradip Chakraborty, Goutam Paul, C. Pandu Rangan. 343-362 [doi]
- Improved Integral Attack on HIGHTYuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii. 363-383 [doi]
- Cryptanalysis of Simpira v2Ivan Tjuawinata, Tao Huang, Hongjun Wu. 384-401 [doi]
- Statistical Integral Distinguisher with Multi-structure and Its Application on AESTingting Cui, Ling Sun, Huaifeng Chen, Meiqin Wang. 402-420 [doi]
- Conditional Differential Cryptanalysis for KreyviumYuhei Watanabe, Takanori Isobe, Masakatu Morii. 421-434 [doi]
- Practical Strongly Invisible and Strongly Accountable Sanitizable SignaturesMichael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig. 437-452 [doi]
- Tightly-Secure Signatures from the Decisional Composite Residuosity AssumptionXiao Zhang, Shengli Liu, Dawu Gu. 453-468 [doi]