Abstract is missing.
- Pairing-Based Cryptography: Past, Present, and FutureDan Boneh. 1 [doi]
- Some Mathematical Mysteries in LatticesChuanming Zong. 2-3 [doi]
- Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple AssumptionsMasayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo. 4-24 [doi]
- Dual Form Signatures: An Approach for Proving Security from Static AssumptionsMichael Gerbush, Allison B. Lewko, Adam O'Neill, Brent Waters. 25-42 [doi]
- Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi. 43-60 [doi]
- On the (Im)possibility of Projecting Property in Prime-Order SettingJae Hong Seo. 61-79 [doi]
- Optimal Reductions of Some Decisional Problems to the Rank ProblemJorge Luis Villar. 80-97 [doi]
- Signature Schemes Secure against Hard-to-Invert LeakageSebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel. 98-115 [doi]
- Completeness for Symmetric Two-Party Functionalities - RevisitedYehuda Lindell, Eran Omri, Hila Zarosim. 116-133 [doi]
- Adaptively Secure Garbling with Applications to One-Time Programs and Secure OutsourcingMihir Bellare, Viet Tung Hoang, Phillip Rogaway. 134-153 [doi]
- The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way FunctionsScott Ames, Rosario Gennaro, Muthuramakrishnan Venkitasubramaniam. 154-171 [doi]
- Perfect Algebraic Immune FunctionsMeicheng Liu, Yin Zhang, Dongdai Lin. 172-189 [doi]
- Differential Analysis of the LED Block CipherFlorian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici. 190-207 [doi]
- PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended AbstractJulia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin. 208-225 [doi]
- Analysis of Differential Attacks in ARX ConstructionsGaëtan Leurent. 226-243 [doi]
- Integral and Multidimensional Linear Distinguishers with Correlation ZeroAndrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang. 244-261 [doi]
- Differential Attacks against Stream Cipher ZUCHongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling. 262-277 [doi]
- An Asymptotically Tight Security Analysis of the Iterated Even-Mansour CipherRodolphe Lampe, Jacques Patarin, Yannick Seurin. 278-295 [doi]
- 3kf9: Enhancing 3GPP-MAC beyond the Birthday BoundLiting Zhang, Wenling Wu, Han Sui, Peng Wang. 296-312 [doi]
- Understanding Adaptivity: Random Systems RevisitedDimitar Jetchev, Onur Özen, Martijn Stam. 313-330 [doi]
- RKA Security beyond the Linear Barrier: IBE, Encryption and SignaturesMihir Bellare, Kenneth G. Paterson, Susan Thomson 0001. 331-348 [doi]
- Fully Secure Unbounded Inner-Product and Attribute-Based EncryptionTatsuaki Okamoto, Katsuyuki Takashima. 349-366 [doi]
- Computing on Authenticated Data: New Privacy Definitions and ConstructionsNuttapong Attrapadung, Benoît Libert, Thomas Peters. 367-385 [doi]
- A Coding-Theoretic Approach to Recovering Noisy RSA KeysKenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn. 386-403 [doi]
- Certifying RSASaqib A. Kakvi, Eike Kiltz, Alexander May. 404-414 [doi]
- Faster Gaussian Lattice Sampling Using Lazy Floating-Point ArithmeticLéo Ducas, Phong Q. Nguyen. 415-432 [doi]
- Learning a Zonotope and More: Cryptanalysis of NTRUSign CountermeasuresLéo Ducas, Phong Q. Nguyen. 433-450 [doi]
- On Polynomial Systems Arising from a Weil DescentChristophe Petit, Jean-Jacques Quisquater. 451-466 [doi]
- ECM at WorkJoppe W. Bos, Thorsten Kleinjung. 467-484 [doi]
- IND-CCA Secure Cryptography Based on a Variant of the LPN ProblemNico Döttling, Jörn Müller-Quade, Anderson C. A. Nascimento. 485-503 [doi]
- Provable Security of the Knudsen-Preneel Compression FunctionsJooyoung Lee. 504-525 [doi]
- Optimal Collision Security in Double Block Length Hashing with Single Length KeyBart Mennink. 526-543 [doi]
- Bicliques for Permutations: Collision and Preimage Attacks in Stronger SettingsDmitry Khovratovich. 544-561 [doi]
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision AttacksYu Sasaki, Lei Wang 0007, Shuang Wu, Wenling Wu. 562-579 [doi]
- Generic Related-Key Attacks for HMACThomas Peyrin, Yu Sasaki, Lei Wang 0007. 580-597 [doi]
- The Five-Card Trick Can Be Done with Four CardsTakaaki Mizuki, Michihito Kumamoto, Hideaki Sone. 598-606 [doi]
- A Mix-Net from Any CCA2 Secure CryptosystemShahram Khazaei, Tal Moran, Douglas Wikström. 607-625 [doi]
- How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to HeliosDavid Bernhard, Olivier Pereira, Bogdan Warinschi. 626-643 [doi]
- Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract)Kyle Brogle, Sharon Goldberg, Leonid Reyzin. 644-662 [doi]
- Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with NoiseAbhishek Jain 0002, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes. 663-680 [doi]
- Calling Out Cheaters: Covert Security with Public VerifiabilityGilad Asharov, Claudio Orlandi. 681-698 [doi]
- A Unified Framework for UC from Only OTRafael Pass, Huijia Lin, Muthuramakrishnan Venkitasubramaniam. 699-717 [doi]
- Four-Dimensional Gallant-Lambert-Vanstone Scalar MultiplicationPatrick Longa, Francesco Sica. 718-739 [doi]
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary NoteNicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof, François-Xavier Standaert. 740-757 [doi]
- Theory and Practice of a Leakage Resilient Masking SchemeJosep Balasch, Sebastian Faust, Benedikt Gierlichs, Ingrid Verbauwhede. 758-775 [doi]