Abstract is missing.
- Integral Cryptanalysis of ARIAPing Li, Bing Sun, Chao Li. 1-14 [doi]
- Cryptanalysis of the ESSENCE Family of Hash FunctionsNicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel. 15-34 [doi]
- Differential-Multiple Linear CryptanalysisZhiqiang Liu, Dawu Gu, Jing Zhang, Wei Li. 35-49 [doi]
- Differential Attack on Five Rounds of the SC2000 Block CipherJiqiang Lu. 50-59 [doi]
- Pairing-Based Nominative Signatures with Selective and Universal ConvertibilityWei Zhao, Dingfeng Ye. 60-74 [doi]
- Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without PairingS. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan. 75-92 [doi]
- Sanitizable Signatures with Strong Transparency in the Standard ModelShivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan. 93-107 [doi]
- Breaking and Building of Threshold Signcryption SchemesS. Sharmila Deva Selvi, S. Sree Vivek, Shilpi Nayak, C. Pandu Rangan. 108-123 [doi]
- Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard AssumptionFengjiao Wang, Yuqing Zhang. 124-133 [doi]
- An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile NetworkZhigang Gao, Dengguo Feng. 134-143 [doi]
- Efficient Password-Based Authenticated Key Exchange Protocol in the UC FrameworkXuexian Hu, Wenfen Liu. 144-153 [doi]
- Efficient Generalized Selective Private Function Evaluation with Applications in Biometric AuthenticationHelger Lipmaa, Bingsheng Zhang. 154-163 [doi]
- Optionally Identifiable Private HandshakesYanjiang Yang, Jian Weng, Jianying Zhou, Ying Qiu. 164-178 [doi]
- Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal ResilienceArpita Patra, Ashish Choudhary, C. Pandu Rangan. 179-197 [doi]
- Gemstone: A New Stream Cipher Using Coupled Map LatticeRuming Yin, Jian Yuan, Qiuhua Yang, Xiuming Shan, Xiqin Wang. 198-214 [doi]
- Proposition of Two Cipher StructuresLei Zhang 0012, Wenling Wu, Liting Zhang. 215-229 [doi]
- Hardware Framework for the Rabbit Stream CipherDeian Stefan. 230-247 [doi]
- Linearity within the SMS4 Block CipherMuhammad Reza Z aba, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong. 248-265 [doi]
- Algebraic Cryptanalysis of Curry and Flurry Using Correlated MessagesJean-Charles Faugère, Ludovic Perret. 266-277 [doi]
- Weak Keys in RSA with Primes Sharing Least Significant BitsXianmeng Meng, Jingguo Bi. 278-287 [doi]
- Hybrid Proxy Re-encryption Scheme for Attribute-Based EncryptionTakeo Mizuno, Hiroshi Doi. 288-302 [doi]
- Constructing Better KEMs with Partial Message RecoveryRui Zhang, Hideki Imai. 303-312 [doi]
- A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing WormsXiaofeng Nie, Jiwu Jing, Yuewu Wang. 313-323 [doi]
- Remodeling Vulnerability InformationFeng Cheng 0002, Sebastian Roschke, Robert Schuppenies, Christoph Meinel. 324-336 [doi]
- Using Strategy Objectives for Network Security AnalysisElie Bursztein, John C. Mitchell. 337-349 [doi]
- A DAA Scheme Requiring Less TPM ResourcesLiqun Chen. 350-365 [doi]
- Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID TagsJohann Großschädl. 366-382 [doi]
- Weaknesses in Two Recent Lightweight RFID Authentication ProtocolsPedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Jan C. A. van der Lubbe. 383-392 [doi]
- Algebraic Side-Channel AttacksMathieu Renauld, François-Xavier Standaert. 393-410 [doi]
- CAPTCHA Phishing: A Practical Attack on Human Interaction ProofingLe Kang, Ji Xiang. 411-425 [doi]
- An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile AgentsSaba Jalal, Brian King. 426-442 [doi]
- A Formal Language for Specifying Complex XML Authorisations with Temporal ConstraintsSean Policarpio, Yan Zhang. 443-457 [doi]