Abstract is missing.
- A New RSA-Based Signature SchemeSven Schäge, Jörg Schwenk. 1-15 [doi]
- Fair Blind Signatures without Random OraclesGeorg Fuchsbauer, Damien Vergnaud. 16-33 [doi]
- Fair Partially Blind SignaturesMarkus Rückert, Dominique Schröder. 34-51 [doi]
- Parallel Shortest Lattice Vector Enumeration on Graphics CardsJens Hermans, Michael Schneider 0002, Johannes Buchmann, Frederik Vercauteren, Bart Preneel. 52-68 [doi]
- Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over ::::F::::::2::Johannes Buchmann, Daniel Cabarcas, Jintai Ding, Mohamed Saied Emam Mohamed. 69-81 [doi]
- Factoring RSA Modulus Using Prime Reconstruction from Random Known BitsSubhamoy Maitra, Santanu Sarkar, Sourav Sengupta. 82-99 [doi]
- Proofs of Restricted ShufflesBjörn Terelius, Douglas Wikström. 100-113 [doi]
- Batch Range Proof for Practical Small RangesKun Peng, Feng Bao. 114-130 [doi]
- Optimistic Fair Priced Oblivious TransferAlfredo Rial, Bart Preneel. 131-147 [doi]
- Information-Theoretically Secure Key-Insulated Multireceiver Authentication CodesTakenobu Seito, Tadashi Aikawa, Junji Shikata, Tsutomu Matsumoto. 148-165 [doi]
- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission SchemesYvo Desmedt, Stelios Erotokritou, Reihaneh Safavi-Naini. 166-183 [doi]
- Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal ResilienceArpita Patra, Ashish Choudhary, C. Pandu Rangan. 184-202 [doi]
- Avoiding Full Extension Field Arithmetic in Pairing ComputationsCraig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong. 203-224 [doi]
- ECC2K-130 on Cell CPUsJoppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe. 225-242 [doi]
- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-AcceleratorM. Abdelaziz Elaabid, Sylvain Guilley. 243-260 [doi]
- Differential Fault Analysis of HC-128Aleksandar Kircanski, Amr M. Youssef. 261-278 [doi]
- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost DevicesMarcel Medwed, François-Xavier Standaert, Johann Großschädl, Francesco Regazzoni. 279-296 [doi]
- Strong Cryptography from Weak SecretsXavier Boyen, Céline Chevalier, Georg Fuchsbauer, David Pointcheval. 297-315 [doi]
- Efficient Unidirectional Proxy Re-EncryptionSherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng. 316-332 [doi]
- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger DefinitionsDavid Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder. 333-350 [doi]
- Flexible Group Key Exchange with On-demand Computation of Subgroup KeysMichel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval. 351-368 [doi]
- Quantum Readout of Physical Unclonable FunctionsBoris Skoric. 369-386 [doi]
- Parallelizing the Camellia and SMS4 Block CiphersHuihui Yap, Khoongming Khoo, Axel Poschmann. 387-406 [doi]
- Improved Linear Differential Attacks on CubeHashShahram Khazaei, Simon Knellwolf, Willi Meier, Deian Stefan. 407-418 [doi]
- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer. 419-436 [doi]