Abstract is missing.
- Secure Outsourced ComputationJake Loftus, Nigel P. Smart. 1-20 [doi]
- Fully Simulatable Quantum-Secure Coin-Flipping and ApplicationsCarolin Lunemann, Jesper Buus Nielsen. 21-40 [doi]
- Efficient and Secure Generalized Pattern Matching via Fast Fourier TransformDamien Vergnaud. 41-58 [doi]
- Identification Schemes from Key Encapsulation MechanismsHiroaki Anada, Seiko Arita. 59-76 [doi]
- Attacking Bivium and Trivium with the Characteristic Set MethodZhenyu Huang, Dongdai Lin. 77-91 [doi]
- Improved Cryptanalysis of the Multi-Prime ::::φ:::: - Hiding AssumptionMathias Herrmann. 92-99 [doi]
- FPGA Implementation of a Statistical Saturation Attack against PRESENTStéphanie Kerckhof, Baudoin Collard, François-Xavier Standaert. 100-116 [doi]
- Collisions of MMO-MD5 and Their Impact on Original MD5Yu Sasaki. 117-133 [doi]
- Really Fast Syndrome-Based HashingDaniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe. 134-152 [doi]
- Montgomery s Trick and Fast Implementation of Masked AESLaurie Genelle, Emmanuel Prouff, Michaël Quisquater. 153-169 [doi]
- Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-::::Z:::: Coordinate RepresentationMichael Hutter, Marc Joye, Yannick Sierra. 170-187 [doi]
- Efficient Multiplication in Finite Field Extensions of Degree 5Nadia El Mrabet, Aurore Guillevic, Sorina Ionica. 188-205 [doi]
- Achieving Optimal Anonymity in Transferable E-Cash with a JudgeOlivier Blazy, Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Hervé Sibert, Jacques Traoré. 206-223 [doi]
- Revocable Attribute-Based Signatures with Adaptive Security in the Standard ModelAlex Escala, Javier Herranz, Paz Morillo. 224-241 [doi]
- Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic DesignFrederik Armknecht, Carsten Elsner, Martin Schmidt. 242-259 [doi]
- Analyzing Standards for RSA IntegersDaniel Loebenberger, Michael Nüsken. 260-277 [doi]
- Hashing into Hessian CurvesReza Rezaeian Farashahi. 278-289 [doi]
- On Randomness Extraction in Elliptic CurvesAbdoul Aziz Ciss, Djiby Sow. 290-297 [doi]
- Fault Analysis of Grain-128 by Targeting NFSRSandip Karmakar, Dipanwita Roy Chowdhury. 298-315 [doi]
- Differential Fault Analysis of SosemanukYaser Esmaeili Salehani, Aleksandar Kircanski, Amr M. Youssef. 316-331 [doi]
- An Improved Differential Fault Analysis on AES-256Subidh Ali, Debdeep Mukhopadhyay. 332-347 [doi]
- Benaloh s Dense Probabilistic Encryption RevisitedLaurent Fousse, Pascal Lafourcade, Mohamed Alnuaimi. 348-362 [doi]
- On the Security of the Winternitz One-Time Signature SchemeJohannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing, Markus Rückert. 363-378 [doi]
- Efficient Zero-Knowledge ProofsJens Groth. 379 [doi]
- Some Key Techniques on Pairing Vector SpacesTatsuaki Okamoto, Katsuyuki Takashima. 380-382 [doi]
- The NIST SHA-3 Competition: A Perspective on the Final YearBart Preneel. 383-386 [doi]