Abstract is missing.
- Differential Attacks on Generalized Feistel SchemesValérie Nachef, Emmanuel Volte, Jacques Patarin. 1-19 [doi]
- Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of OperationBo Zhu, Yin Tan, Guang Gong. 20-38 [doi]
- Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?Si Gao, Hua Chen, Limin Fan. 39-56 [doi]
- Zero Knowledge Proofs from Ring-LWEXiang Xie, Rui Xue, Minqian Wang. 57-73 [doi]
- Zero Knowledge with Rubik's Cubes and Non-abelian GroupsEmmanuel Volte, Jacques Patarin, Valérie Nachef. 74-91 [doi]
- Efficient Modular NIZK Arguments from Shift and ProductPrastudy Fauzi, Helger Lipmaa, Bingsheng Zhang. 92-121 [doi]
- Strongly Secure One-Round Group Authenticated Key Exchange in the Standard ModelYong Li, Zheng Yang. 122-138 [doi]
- Achieving Correctness in Fair Rational Secret SharingSourya Joyee De, Asim K. Pal. 139-161 [doi]
- BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow AnalysisNizar Kheir, Chirine Wolley. 162-178 [doi]
- Resource Access Control in the Facebook ModelKonstantinos Chronopoulos, Maria Gouseti, Aggelos Kiayias. 179-198 [doi]
- Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving GestureBabins Shrestha, Nitesh Saxena, Justin Harrison. 199-217 [doi]
- Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General DefinitionMihir Bellare, Adam O'Neill. 218-234 [doi]
- Efficient Lossy Trapdoor Functions Based on Subgroup Membership AssumptionsHaiyang Xue, Bao Li, Xianhui Lu, Dingding Jia, Yamin Liu. 235-250 [doi]
- Unique Aggregate Signatures with Applications to Distributed Verifiable Random FunctionsVeronika Kuchta, Mark Manulis. 251-270 [doi]
- A Practical Related-Key Boomerang Attack for the Full MMB Block CipherTomer Ashur, Orr Dunkelman. 271-290 [doi]
- Truncated Differential Analysis of Reduced-Round LBlockSareh Emami, Cameron McDonald, Josef Pieprzyk, Ron Steinfeld. 291-308 [doi]
- How to Update Documents Verifiably in Searchable Symmetric EncryptionKaoru Kurosawa, Yasuhiro Ohtaki. 309-328 [doi]
- Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear MapsLiang Feng Zhang, Reihaneh Safavi-Naini. 329-348 [doi]