Abstract is missing.
- New Modular Compilers for Authenticated Key ExchangeYong Li, Sven Schäge, Zheng Yang, Christoph Bader, Jörg Schwenk. 1-18 [doi]
- Password-Based Authenticated Key Exchange without Centralized Trusted SetupKazuki Yoneyama. 19-36 [doi]
- A Linear Algebra Attack to Group-Ring-Based Key Exchange ProtocolsM. Kreuzer, Alexey D. Myasnikov, Alexander Ushakov. 37-43 [doi]
- Improved Constructions of PRFs Secure Against Related-Key AttacksKevin Lewi, Hart William Montgomery, Ananth Raghunathan. 44-61 [doi]
- Verifiable Multi-server Private Information RetrievalLiang Feng Zhang, Reihaneh Safavi-Naini. 62-79 [doi]
- Certified BitcoinsGiuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros. 80-96 [doi]
- Leakage Resilient Proofs of Ownership in Cloud Storage, RevisitedJia Xu, Jianying Zhou. 97-115 [doi]
- Private Message Transmission Using Disjoint PathsHadi Ahmadi, Reihaneh Safavi-Naini. 116-133 [doi]
- Partial Key Exposure Attacks on Takagi's Variant of RSAZhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie. 134-150 [doi]
- New Partial Key Exposure Attacks on CRT-RSA with Large Public ExponentsYao Lu, Rui Zhang 0002, Dongdai Lin. 151-162 [doi]
- Bit-Flip Faults on Elliptic Curve Base Fields, RevisitedTaechan Kim, Mehdi Tibouchi. 163-180 [doi]
- All-but-One Dual Projective Hashing and Its ApplicationsZongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao. 181-198 [doi]
- Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key ExchangeFranziskus Kiefer, Mark Manulis. 199-216 [doi]
- Sakura: A Flexible Coding for Tree HashingGuido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche. 217-234 [doi]
- Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash FunctionsYusuke Naito, Kazuki Yoneyama, Kazuo Ohta. 235-252 [doi]
- Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and ApplicationsYu Sasaki. 253-270 [doi]
- On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type CiphersCéline Blondeau, Andrey Bogdanov, Meiqin Wang. 271-288 [doi]
- Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash FunctionBingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li. 289-307 [doi]
- Differential Cryptanalysis and Linear Distinguisher of Full-Round ZorroYanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu. 308-323 [doi]
- Detecting Hidden LeakagesAmir Moradi, Sylvain Guilley, Annelie Heuser. 324-342 [doi]
- Improving Intrusion Detection Systems for Wireless Sensor NetworksAndriy Stetsko, Tobiás Smolka, Vashek Matyás, Martin Stehlík. 343-360 [doi]
- MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor NetworksZhe Liu, Erich Wenger, Johann Großschädl. 361-379 [doi]
- BackRef: Accountability in Anonymous Communication NetworksMichael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel. 380-400 [doi]
- WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTPMichael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin. 401-418 [doi]
- A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation ListNuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai. 419-437 [doi]
- Faster Batch Verification of Standard ECDSA Signatures Using Summation PolynomialsSabyasachi Karati, Abhijit Das. 438-456 [doi]
- On Updatable Redactable SignaturesHenrich Christopher Pöhls, Kai Samelin. 457-475 [doi]
- Practical Signatures from the Partial Fourier Recovery ProblemJeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte. 476-493 [doi]
- Activity Spoofing and Its Defense in Android SmartphonesBrett Cooley, Haining Wang, Angelos Stavrou. 494-512 [doi]
- Polymorphism as a Defense for Automated Attack of WebsitesXinran Wang, Tadayoshi Kohno, Bob Blakley. 513-530 [doi]
- Fragmentation Considered Leaking: Port Inference for DNS PoisoningHaya Shulman, Michael Waidner. 531-548 [doi]
- Delegating a Pairing Can Be Both Secure and EfficientSébastien Canard, Julien Devigne, Olivier Sanders. 549-565 [doi]
- Automatic Protocol Selection in Secure Two-Party ComputationsFlorian Kerschbaum, Thomas Schneider 0003, Axel Schröpfer. 566-584 [doi]