Abstract is missing.
- The Hidden Side of Jean-Jacques QuisquaterMichaël Quisquater. 1-2 [doi]
- On Quisquater's Multiplication AlgorithmMarc Joye. 3-7 [doi]
- A Brief Survey of Research Jointly with Jean-Jacques QuisquaterYvo Desmedt. 8-12 [doi]
- DES Collisions RevisitedSebastiaan Indesteege, Bart Preneel. 13-24 [doi]
- Line Directed HypergraphsJean-Claude Bermond, Fahir Ö. Ergincan, Michel Syska. 25-34 [doi]
- Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoqNicolas T. Courtois, Gregory V. Bard. 35-54 [doi]
- Self-similarity Attacks on Block Ciphers and Application to KeeLoqNicolas T. Courtois. 55-66 [doi]
- Increasing Block Sizes Using Feistel Networks: The Example of the AESJacques Patarin, Benjamin Gittins, Joana Treger. 67-82 [doi]
- Authenticated-Encryption with Padding: A Formal Security TreatmentKenneth G. Paterson, Gaven J. Watson. 83-107 [doi]
- Traceable Signature with Stepping CapabilitiesOlivier Blazy, David Pointcheval. 108-131 [doi]
- Deniable RSA Signature - The Raise and Fall of Ali BabaSerge Vaudenay. 132-142 [doi]
- Autotomic SignaturesDavid Naccache, David Pointcheval. 143-155 [doi]
- Fully Forward-Secure Group SignaturesBenoît Libert, Moti Yung. 156-184 [doi]
- Public Key Encryption for the ForgetfulPuwen Wei, Yuliang Zheng, Xiaoyun Wang. 185-206 [doi]
- Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated MappingJean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier. 207-232 [doi]
- Secret Key Leakage from Public Key Perturbation of DLP-Based CryptosystemsAlexandre Berzati, Cécile Canovas-Dumas, Louis Goubin. 233-247 [doi]
- EM Probes Characterisation for Security AnalysisBenjamin Mounier, Anne-Lise Ribotta, Jacques Fournier, Michel Agoyan, Assia Tria. 248-264 [doi]
- An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and CostJunfeng Fan, Ingrid Verbauwhede. 265-282 [doi]
- Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All OrdersFrançois-Xavier Standaert, Christophe Petit, Nicolas Veyrat-Charvillon. 283-299 [doi]
- Efficient Implementation of True Random Number Generator Based on SRAM PUFsVincent van der Leest, Erik van der Sluis, Geert Jan Schrijen, Pim Tuyls, Helena Handschuh. 300-318 [doi]
- Operand Folding Hardware MultipliersByungchun Chung, Sandra Marcello, Amir-Pasha Mirbaha, David Naccache, Karim Sabeg. 319-328 [doi]
- SIMPL Systems as a Keyless Cryptographic and Security PrimitiveUlrich Rührmair. 329-354 [doi]
- Cryptography with Asynchronous Logic AutomataPeter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, Neil Gershenfeld. 355-363 [doi]
- A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processorsJonathan Valamehr, Ted Huffmire, Cynthia E. Irvine, Ryan Kastner, Çetin Kaya Koç, Timothy E. Levin, Timothy Sherwood. 364-382 [doi]
- The Challenges Raised by the Privacy-Preserving Identity CardYves Deswarte, Sébastien Gambs. 383-404 [doi]
- The Next Smart Card Nightmare - Logical Attacks, Combined Attacks, Mutant Applications and Other Funny ThingsGuillaume Bouffard, Jean-Louis Lanet. 405-424 [doi]
- Localization PrivacyMike Burmester. 425-441 [doi]
- Dynamic Secure Cloud Storage with ProvenanceSherman S. M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, Robert H. Deng. 442-464 [doi]
- Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud StorageGeorge I. Davida, Yair Frankel. 465-473 [doi]
- A Nagell Algorithm in Any CharacteristicMehdi Tibouchi. 474-479 [doi]
- How to Read a Signature?Vanessa Gratzer, David Naccache. 480-483 [doi]
- Fooling a Liveness-Detecting Capacitive Fingerprint ScannerEdwin Bowden-Peters, Raphael C.-W. Phan, John N. Whitley, David J. Parish. 484-490 [doi]
- Physical Simulation of Inarticulate RobotsGuillaume Claret, Michaël Mathieu, David Naccache, Guillaume Seguin. 491-499 [doi]