Abstract is missing.
- Adapting Lyubashevsky's Signature Schemes to the Ring Signature SettingCarlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit. 1-25 [doi]
- GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary FieldUtsab Bose, Anup Kumar Bhattacharya, Abhijit Das. 26-42 [doi]
- On Constructions of Involutory MDS MatricesKishan Chand Gupta, Indranil Ghosh Ray. 43-60 [doi]
- Homomorphic Encryption with Access Policies: Characterization and New ConstructionsMichael Clear, Arthur Hughes, Hitesh Tewari. 61-87 [doi]
- Brandt's Fully Private Auction Protocol RevisitedJannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade. 88-106 [doi]
- HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance ProblemsAlexandre Duc, Serge Vaudenay. 107-126 [doi]
- Attacking AES Using Bernstein's Attack on Modern ProcessorsHassan Aly, Mohammed ElGayyar. 127-139 [doi]
- Optimal Public Key Traitor Tracing Scheme in Non-Black Box ModelPhilippe Guillot, Abdelkrim Nimour, Duong Hieu Phan, Viet Cuong Trinh. 140-155 [doi]
- NaCl on 8-Bit AVR MicrocontrollersMichael Hutter, Peter Schwabe. 156-172 [doi]
- W-OTS+ - Shorter Signatures for Hash-Based Signature SchemesAndreas Hülsing. 173-188 [doi]
- New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUsAyesha Khalid, Goutam Paul, Anupam Chattopadhyay. 189-207 [doi]
- Cryptanalysis of AES and Camellia with Related S-boxesMarco Macchetti. 208-221 [doi]
- New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann, Willi Meier. 222-239 [doi]
- Impact of Sboxes Size upon Side Channel Resistance and Block Cipher DesignLouis Goubin, Ange Martinelli, Matthieu Walle. 240-259 [doi]
- Efficient Multiparty Computation for Arithmetic Circuits against a Covert MajorityIsheeta Nargis, Payman Mohassel, Wayne Eberly. 260-278 [doi]
- CD in Scalar Multiplication over Binary Elliptic CurveChristophe Nègre, Jean-Marc Robert. 279-296 [doi]
- An Attack on RSA Using LSBs of Multiples of the Prime FactorsAbderrahmane Nitaj. 297-310 [doi]
- Modification and Optimisation of an ElGamal-Based PVSS SchemeKun Peng. 311-327 [doi]
- Studying a Range Proof Technique - Exception and OptimisationKun Peng, Li Yi. 328-341 [doi]
- Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage ModelDuong Hieu Phan, Viet Cuong Trinh. 342-358 [doi]
- Fast Software Encryption Attacks on AESDavid Gstir, Martin Schläffer. 359-374 [doi]
- Sieving for Shortest Vectors in Ideal LatticesMichael Schneider 0002. 375-391 [doi]
- An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors SelectionSebastian Staamann. 392-405 [doi]
- A Comparison of Time-Memory Trade-Off Attacks on Stream CiphersFabian van den Broek, Erik Poll. 406-423 [doi]
- On the Expansion Length Of Triple-Base Number SystemsWei Yu, Kunpeng Wang, Bao Li, Song Tian. 424-432 [doi]
- Triple-Base Number System for Scalar MultiplicationWei Yu, Kunpeng Wang, Bao Li, Song Tian. 433-451 [doi]