Abstract is missing.
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVALGaoli Wang, Shaohui Wang. 1-13 [doi]
- Cryptanalysis of VortexJean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen. 14-28 [doi]
- Two Passes of Tiger Are Not One-WayFlorian Mendel. 29-40 [doi]
- Generic Attacks on Feistel Networks with Internal PermutationsJoana Treger, Jacques Patarin. 41-59 [doi]
- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large BlocksMarine Minier, Raphael C.-W. Phan, Benjamin Pousse. 60-76 [doi]
- Reducing Key Length of the McEliece CryptosystemThierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani. 77-97 [doi]
- Cryptanalysis of RSA Using the Ratio of the PrimesAbderrahmane Nitaj. 98-115 [doi]
- New RSA-Based (Selectively) Convertible Undeniable Signature SchemesLe Trieu Phong, Kaoru Kurosawa, Wakaha Ogata. 116-134 [doi]
- A Schnorr-Like Lightweight Identity-Based Signature SchemeDavid Galindo, Flavio D. Garcia. 135-148 [doi]
- On the Theoretical Gap between Group Signatures with and without UnlinkabilityGo Ohtake, Arisa Fujii, Goichiro Hanaoka, Kazuto Ogawa. 149-166 [doi]
- Practical Threshold Signatures with Linear Secret Sharing SchemesIlker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk. 167-178 [doi]
- Certified Encryption RevisitedPooya Farshim, Bogdan Warinschi. 179-197 [doi]
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential SystemsSiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini. 198-216 [doi]
- Anonymity from Public Key Encryption to Undeniable SignaturesLaila El Aimani. 217-234 [doi]
- Security Analysis of Standard Authentication and Key Agreement Protocols Utilising TimestampsManuel Barbosa, Pooya Farshim. 235-253 [doi]
- Password-Authenticated Group Key Agreement with Adaptive Security and ContributivenessMichel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval. 254-271 [doi]
- Unifying Zero-Knowledge Proofs of KnowledgeUeli Maurer. 272-286 [doi]
- Co-sound Zero-Knowledge with Public KeysCarmine Ventre, Ivan Visconti. 287-304 [doi]
- Another Look at Extended Private Information Retrieval ProtocolsJulien Bringer, Hervé Chabanne. 305-322 [doi]
- Constructing Universally Composable Oblivious Transfers from Double Trap-Door EncryptionsHuafei Zhu, Feng Bao. 323-333 [doi]
- Exponent Recoding and Regular Exponentiation AlgorithmsMarc Joye, Michael Tunstall. 334-349 [doi]
- Efficient Acceleration of Asymmetric Cryptography on Graphics HardwareOwen Harrison, John Waldron. 350-367 [doi]
- Fast Elliptic-Curve Cryptography on the Cell Broadband EngineNeil Costigan, Peter Schwabe. 368-385 [doi]
- On Modular Decomposition of IntegersBilly Bob Brumley, Kaisa Nyberg. 386-402 [doi]
- Breaking KeeLoq in a Flash: On Extracting Keys at Lightning SpeedMarkus Kasper, Timo Kasper, Amir Moradi, Christof Paar. 403-420 [doi]
- An Improved Fault Based Attack of the Advanced Encryption StandardDebdeep Mukhopadhyay. 421-434 [doi]