Abstract is missing.
- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer KeysMark Manulis. 1-19 [doi]
- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange ProtocolCas J. F. Cremers. 20-33 [doi]
- Secure Pairing of Interface-Constrained Devices Resistant against Rushing User BehaviorNitesh Saxena, Md. Borhan Uddin. 34-52 [doi]
- How to Extract and Expand Randomness: A Summary and Explanation of Existing ResultsYvonne Cliff, Colin Boyd, Juan Manuel González Nieto. 53-70 [doi]
- Novel Precomputation Schemes for Elliptic Curve CryptosystemsPatrick Longa, Catherine H. Gebotys. 71-88 [doi]
- Practical Secure Evaluation of Semi-private FunctionsAnnika Paus, Ahmad-Reza Sadeghi, Thomas Schneider. 89-106 [doi]
- Secure Hamming Distance Based Computation and Its ApplicationsAyman Jarrous, Benny Pinkas. 107-124 [doi]
- Efficient Robust Private Set IntersectionDana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung. 125-142 [doi]
- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext AttackJoonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou. 143-155 [doi]
- An Efficient Identity-Based Online/Offline Encryption SchemeJoseph K. Liu, Jianying Zhou. 156-167 [doi]
- Dual-Policy Attribute Based EncryptionNuttapong Attrapadung, Hideki Imai. 168-185 [doi]
- Construction of Threshold Public-Key Encryptions through Tag-Based EncryptionsSeiko Arita, Koji Tsurudome. 186-200 [doi]
- Malyzer: Defeating Anti-detection for Application-Level Malware AnalysisLei Liu, Songqing Chen. 201-218 [doi]
- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive NetworksIan Goldberg, Atefeh Mashatan, Douglas R. Stinson. 219-237 [doi]
- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext SizeMoonShik Lee, Daegun Ma, MinJae Seo. 238-252 [doi]
- Tracing and Revoking Pirate RebroadcastsAggelos Kiayias, Serdar Pehlivanoglu. 253-271 [doi]
- Efficient Deniable Authentication for SignaturesJean Monnerat, Sylvain Pasini, Serge Vaudenay. 272-291 [doi]
- Homomorphic MACs: MAC-Based Integrity for Network CodingShweta Agrawal, Dan Boneh. 292-305 [doi]
- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PINYuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo. 306-323 [doi]
- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access NetworksJörg Lenhard, Karsten Loesing, Guido Wirtz. 324-341 [doi]
- Cryptanalysis of TwisterFlorian Mendel, Christian Rechberger, Martin Schläffer. 342-353 [doi]
- Cryptanalysis of CubeHashEric Brier, Thomas Peyrin. 354-368 [doi]
- Collision Attack on BooleFlorian Mendel, Tomislav Nad, Martin Schläffer. 369-381 [doi]
- Integrity Protection for Revision ControlChristian Cachin, Martin Geisler. 382-399 [doi]
- Fragility of the Robust Security Network: 802.11 Denial of ServiceMartin Eian. 400-416 [doi]
- Fast Packet Classification Using Condition FactorizationAlok Tongaonkar, R. Sekar, Sreenaath Vasudevan. 417-436 [doi]
- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM ApproachesPhilip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte. 437-455 [doi]
- Broadcast Attacks against Lattice-Based CryptosystemsThomas Plantard, Willy Susilo. 456-472 [doi]
- Partial Key Exposure Attack on CRT-RSASantanu Sarkar, Subhamoy Maitra. 473-484 [doi]
- How to Compare Profiled Side-Channel Attacks?François-Xavier Standaert, François Koeune, Werner Schindler. 485-498 [doi]
- Theoretical and Practical Aspects of Mutual Information Based Side Channel AnalysisEmmanuel Prouff, Matthieu Rivain. 499-518 [doi]
- Attacking ECDSA-Enabled RFID DevicesMichael Hutter, Marcel Medwed, Daniel Hein, Johannes Wolkerstorfer. 519-534 [doi]