Abstract is missing.
- Batch Verification of ECDSA SignaturesSabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer. 1-18 [doi]
- Extended Security Arguments for Signature SchemesSidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel. 19-34 [doi]
- Sanitizable Signatures with Several Signers and SanitizersSébastien Canard, Amandine Jambert, Roch Lescuyer. 35-52 [doi]
- Attack Based on Direct Sum Decomposition against the Nonlinear Filter GeneratorJingjing Wang, Xiangxue Li, Kefei Chen, Wenzheng Zhang. 53-66 [doi]
- Fuzzy Vault for Multiple UsersJulien Bringer, Hervé Chabanne, Mélanie Favre. 67-81 [doi]
- Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized AdversaryReihaneh Safavi-Naini, Mohammed Ashraful Tuhin. 82-98 [doi]
- Improving the Performance of the SYND Stream CipherMohammed Meziani, Gerhard Hoffmann, Pierre-Louis Cayrel. 99-116 [doi]
- Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHTJiazhe Chen, Meiqin Wang, Bart Preneel. 117-137 [doi]
- Three-Subset Meet-in-the-Middle Attack on Reduced XTEAYu Sasaki, Lei Wang 0007, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta. 138-154 [doi]
- Differential Cryptanalysis of Reduced-Round ICEBERGYue Sun, Meiqin Wang, Shujia Jiang, Qiumei Sun. 155-171 [doi]
- Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny DevicesThomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel. 172-187 [doi]
- Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are ImportantEnrico Thomae, Christopher Wolf. 188-202 [doi]
- A Complementary Analysis of the (s)YZ and DIKE ProtocolsAugustin P. Sarr, Philippe Elbaz-Vincent. 203-220 [doi]
- A New Attack on RSA and CRT-RSAAbderrahmane Nitaj. 221-233 [doi]
- Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic EncryptionFrederik Armknecht, Stefan Katzenbeisser, Andreas Peter. 234-251 [doi]
- The Collision Security of MDC-4Ewan Fleischmann, Christian Forler, Stefan Lucks. 252-269 [doi]
- SPN-Hash: Improving the Provable Resistance against Differential Collision AttacksJiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo 0001, Thomas Peyrin, Axel Poschmann, Chik-How Tan. 270-286 [doi]
- Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and SkeinElena Andreeva, Bart Mennink, Bart Preneel, Marjan Skrobot. 287-305 [doi]
- The GLUON Family: A Lightweight Hash Function Family Based on FCSRsThierry P. Berger, Joffrey D'Hayer, Kevin Marquet, Marine Minier, Gaël Thomas 0002. 306-323 [doi]
- SHA-3 on ARM11 ProcessorsPeter Schwabe, Bo-Yin Yang, Shang-Yi Yang. 324-341 [doi]
- Improved Fixed-Base Comb Method for Fast Scalar MultiplicationNashwa A. F. Mohamed, Mohsin H. A. Hashim, Michael Hutter. 342-359 [doi]
- Optimal First-Order Masking with Linear and Non-linear BijectionsHoussem Maghrebi, Claude Carlet, Sylvain Guilley, Jean-Luc Danger. 360-377 [doi]
- Size-Hiding in Private Set Intersection: Existential Results and ConstructionsPaolo D'Arco, Maria Isabel Gonzalez Vasco, Angel L. Pérez del Pozo, Claudio Soriente. 378-394 [doi]
- Round-Optimal Black-Box Statistically Binding Selective-Opening Secure CommitmentsDavid Xiao. 395-411 [doi]
- Stream Ciphers, a PerspectiveWilli Meier. 412 [doi]
- Black-Box Reductions and Separations in CryptographyMarc Fischlin. 413-422 [doi]