Abstract is missing.
- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing MinimaVladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider. 1-20 [doi]
- Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic SecurityG. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan. 21-40 [doi]
- On Cryptographic Schemes Based on Discrete Logarithms and FactoringMarc Joye. 41-52 [doi]
- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENTJorge Nakahara, Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang. 58-75 [doi]
- Saturation Attack on the Block Cipher HIGHTPeng Zhang, Bing Sun, Chao Li. 76-86 [doi]
- Extensions of the Cube Attack Based on Low Degree AnnihilatorsAileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, Josef Pieprzyk. 87-102 [doi]
- An Analysis of the Compact XSL Attack on BES and Embedded SMS4Jiali Choy, Huihui Yap, Khoongming Khoo. 103-118 [doi]
- RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay AttacksChong Hee Kim, Gildas Avoine. 119-133 [doi]
- Anonymizer-Enabled Security and Privacy for RFIDAhmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann. 134-153 [doi]
- Blink Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor NodesNitesh Saxena, Md. Borhan Uddin. 154-173 [doi]
- DepenDNS: Dependable Mechanism against DNS Cache PoisoningHung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin. 174-188 [doi]
- Privacy-Preserving Relationship Path Discovery in Social NetworksGhita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos. 189-208 [doi]
- Verifying Anonymous Credential Systems in Applied Pi CalculusXiangxi Li, Yu Zhang, Yuxin Deng. 209-225 [doi]
- Transferable Constant-Size Fair E-CashGeorg Fuchsbauer, David Pointcheval, Damien Vergnaud. 226-247 [doi]
- A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random OracleLiming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. 248-258 [doi]
- Private-Key Hidden Vector Encryption with Key ConfidentialityCarlo Blundo, Vincenzo Iovino, Giuseppe Persiano. 259-277 [doi]
- Building Secure Networked Systems with Code AttestationAdrian Perrig. 278 [doi]
- HPAKE : Password Authentication Secure against Cross-Site User ImpersonationXavier Boyen. 279-298 [doi]
- An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart CardsWenting Jin, Jing Xu. 299-314 [doi]
- Ensuring Authentication of Digital Information Using Cryptographic AccumulatorsChristophe Tartary. 315-333 [doi]
- MIBS: A New Lightweight Block CipherMaryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, Hossein Arabnezhad Khanooki. 334-348 [doi]
- Distinguishing and Second-Preimage Attacks on CBC-Like MACsKeting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu. 349-361 [doi]
- Improving the Rainbow Attack by Reusing ColoursMartin Ã…gren, Thomas Johansson, Martin Hell. 362-378 [doi]
- Side Channel Cube Attack on PRESENTLin Yang, Meiqin Wang, Siyuan Qiao. 379-391 [doi]
- Algebraic Attack on the MQQ Public Key CryptosystemMohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann, Fabian Werner. 392-401 [doi]
- Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic ImmunityShaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu. 402-412 [doi]
- Multi-core Implementation of the Tate Pairing over Supersingular Elliptic CurvesJean-Luc Beuchat, Emmanuel López-Trejo, Luis MartÃnez-Ramos, Shigeo Mitsunari, Francisco RodrÃguez-HenrÃquez. 413-432 [doi]
- On the Complexity of Computing Discrete Logarithms over Algebraic ToriShuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya. 433-442 [doi]
- On the Usability of Secure Association of Wireless Devices Based on Distance BoundingMario Cagalj, Nitesh Saxena, Ersin Uzun. 443-462 [doi]
- Short Hash-Based Signatures for Wireless Sensor NetworksErik Dahmen, Christoph Krauß. 463-476 [doi]
- Computing on Encrypted DataCraig Gentry. 477 [doi]
- Fully Robust Tree-Diffie-Hellman Group Key ExchangeTimo Brecher, Emmanuel Bresson, Mark Manulis. 478-497 [doi]
- Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard ModelBenoît Libert, Damien Vergnaud. 498-517 [doi]
- Relinkable Ring SignatureKoutarou Suzuki, Fumitaka Hoshino, Tetsutaro Kobayashi. 518-536 [doi]