Abstract is missing.
- Conditional Differential Cryptanalysis of Grain-128aMichael Lehmann, Willi Meier. 1-11 [doi]
- A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu. 12-22 [doi]
- A Simple Key-Recovery Attack on McOE-XFlorian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser. 23-31 [doi]
- Cryptanalysis of a Lattice-Knapsack Mixed Public Key CryptosystemJun Xu, Lei Hu, Siwei Sun, Ping Wang. 32-42 [doi]
- Biclique Cryptanalysis of TWINEMustafa Çoban, Ferhat Karakoç, Özkan Boztas. 43-55 [doi]
- n Block Ciphers (under Weak Keys)Jorge Nakahara Jr.. 56-71 [doi]
- Improved Linear Analysis on Block Cipher MULTI2Yi Lu 0002, Liping Ding, Yongji Wang. 72-85 [doi]
- Fixed Points of Special Type and Cryptanalysis of Full GOSTOrhun Kara, Ferhat Karakoç. 86-97 [doi]
- Attacking Animated CAPTCHAs via Character ExtractionVu Duc Nguyen, Yang-Wai Chow, Willy Susilo. 98-113 [doi]
- k-Partite GraphsOrestis Tsigkas, Dimitrios Tzovaras. 114-125 [doi]
- Mobile Evil Twin Malnets - The Worst of Both WorldsChristian Szongott, Benjamin Henne, Matthew Smith. 126-141 [doi]
- Firm Grip Handshakes: A Tool for Bidirectional VouchingOmer Berkman, Benny Pinkas, Moti Yung. 142-157 [doi]
- Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One RoundKashi Neupane, Rainer Steinwandt, Adriana Suárez Corona. 158-168 [doi]
- Applicability of OR-Proof Techniques to Hierarchical Identity-Based IdentificationAtsushi Fujioka, Taiichi Saito, Keita Xagawa. 169-184 [doi]
- LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area NetworksBogdan Groza, Pal-Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede. 185-200 [doi]
- Efficient Verification of Input Consistency in Server-Assisted Secure Function EvaluationVladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa. 201-217 [doi]
- Fast and Private Computation of Cardinality of Set Intersection and UnionEmiliano De Cristofaro, Paolo Gasti, Gene Tsudik. 218-231 [doi]
- Fast and Secure Root Finding for Code-Based CryptosystemsFalko Strenzke. 232-246 [doi]
- Strong Privacy for RFID Systems from Plaintext-Aware EncryptionKhaled Ouafi, Serge Vaudenay. 247-262 [doi]
- How to Enhance the Security on the Least Significant BitAtsuko Miyaji, Yiren Mo. 263-279 [doi]
- Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean FunctionsMansoor Ahmed Khan, Ferruh Özbudak. 280-295 [doi]
- 2)Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores. 296-309 [doi]