Abstract is missing.
- Universally Verifiable Multiparty Computation from Threshold Homomorphic CryptosystemsBerry Schoenmakers, Meilof Veeningen. 3-22 [doi]
- Communication-Optimal Proactive Secret Sharing for Dynamic GroupsJoshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky. 23-41 [doi]
- Round-Optimal Password-Based Group Key Exchange Protocols in the Standard ModelJing Xu, Xuexian Hu, Zhenfeng Zhang. 42-61 [doi]
- Generic Construction of UC-Secure Oblivious TransferOlivier Blazy, Céline Chevalier. 65-86 [doi]
- Non-malleability Under Selective Opening Attacks: Implication and SeparationZhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen. 87-104 [doi]
- A Signature Scheme with a Fuzzy Private KeyKenta Takahashi, Takahiro Matsuda 0002, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki. 105-126 [doi]
- Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseZhen Liu, Duncan S. Wong. 127-146 [doi]
- Zero-Knowledge Authenticated Order Queries and Order Statistics on a ListEsha Ghosh, Olga Ohrimenko, Roberto Tamassia. 149-171 [doi]
- Private Database Access with HE-over-ORAM ArchitectureCraig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova 0001. 172-191 [doi]
- Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic SignaturesJae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama. 192-214 [doi]
- LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive DataWeiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang. 215-239 [doi]
- Violating Consumer Anonymity: Geo-Locating Nodes in Named Data NetworkingAlberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik. 243-262 [doi]
- Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget)Satrajit Ghosh, Aniket Kate. 263-286 [doi]
- Scalable Divisible E-cashSébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. 287-306 [doi]
- Recovering Lost Device-Bound CredentialsFoteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven. 307-327 [doi]
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSAAleksandar Kircanski. 331-349 [doi]
- Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract)Jiqiang Lu, Zhen Li, Matt Henricksen. 350-369 [doi]
- Evaluation and Cryptanalysis of the Pandaka Lightweight CipherYuval Yarom, Gefei Li, Damith Chinthana Ranasinghe. 370-385 [doi]
- Cryptographic Enforcement of Information Flow Policies Without Public InformationJason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering. 389-408 [doi]
- A Fully Decentralized Data Usage Control Enforcement InfrastructureFlorian Kelbert, Alexander Pretschner. 409-430 [doi]
- Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online InformationMilivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes 0001, Ninja Marnau, Peter Druschel. 431-453 [doi]
- Exploiting Eye Tracking for Smartphone AuthenticationDachuan Liu, Bo Dong, Xing Gao, Haining Wang. 457-477 [doi]
- Optimal Proximity Proofs RevisitedHandan Kilinç, Serge Vaudenay. 478-494 [doi]
- Replacement Attacks: Automatically Impeding Behavior-Based Malware SpecificationsJiang Ming, Zhi-Xin, Pengwei Lan, Dinghao Wu, Peng Liu 0005, Bing Mao. 497-517 [doi]
- Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption ExponentsAtsushi Takayasu, Noboru Kunihiro. 518-537 [doi]
- Differential Power Analysis of a McEliece CryptosystemCong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt. 538-556 [doi]
- Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in HardwareTobias Schneider, Amir Moradi, Tim Güneysu. 559-578 [doi]
- Foundations of Reconfigurable PUFsJonas Schneider, Dominique Schröder. 579-594 [doi]
- mrPUF: A Novel Memristive Device Based Physical Unclonable FunctionYansong Gao, Damith Chinthana Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott. 595-615 [doi]
- On the XOR of Multiple Random PermutationsBart Mennink, Bart Preneel. 619-634 [doi]
- Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel AttacksMichel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud. 635-654 [doi]
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and PracticeMarcin Andrychowicz, Daniel Masny, Edoardo Persichetti. 655-674 [doi]
- Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak SourcesMichael Backes 0001, Aniket Kate, Sebastian Meiser, Tim Ruffing. 675-695 [doi]