Abstract is missing.
- New Constructions of Public-Key Encryption Schemes from Conjugacy Search ProblemsLihua Wang, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao. 1-17 [doi]
- On the CCA1-Security of Elgamal and Damgård s ElgamalHelger Lipmaa. 18-35 [doi]
- Online/Offline Identity-Based Signcryption RevisitedJoseph K. Liu, Joonsang Baek, Jianying Zhou. 36-51 [doi]
- Error-free, Multi-bit Non-committing Encryption with Constant Round ComplexityHuafei Zhu, Feng Bao. 52-61 [doi]
- A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key ModelJiageng Chen, Atsuko Miyaji. 62-76 [doi]
- An Efficient, Parameterized and Scalable S-box for Stream CiphersSourav Das, Dipanwita Roy Chowdhury. 77-94 [doi]
- A Family of Binary Threshold Sequences Constructed by Using the Multiplicative InverseZhixiong Chen, Xiangguo Cheng, Chenhuang Wu. 95-104 [doi]
- A Generalization of Verheul s Theorem for Some Ordinary CurvesZhi Hu, MaoZhi Xu, Zhenghua Zhou. 105-114 [doi]
- On the Combinatorial Approaches of Computing Upper Bounds on the Information Rate of Secret Sharing SchemesZhanfei Zhou. 115-124 [doi]
- Building Oblivious Transfer on Channel DelaysPaolo Palmieri, Olivier Pereira. 125-138 [doi]
- Variants of Multicollision Attacks on Iterated Hash FunctionsTuomas Kortelainen, Juha Kortelainen, Kimmo Halunen. 139-154 [doi]
- Hyper-Sbox View of AES-like Permutations: A Generalized DistinguisherShuang Wu, Dengguo Feng, Wenling Wu, Bozhan Su. 155-168 [doi]
- Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160Chiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama. 169-186 [doi]
- Pseudo-Cryptanalysis of LuffaKeting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang. 187-198 [doi]
- Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256, 320}Gaoli Wang. 199-217 [doi]
- How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange ProtocolsWeijia Wang, Lei Hu, Yong Li 0002. 218-235 [doi]
- Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various EnvironmentsYvo Desmedt, Atsuko Miyaji. 236-254 [doi]
- Multi-Factor Authenticated Key Exchange Protocol in the Three-Party SettingYing Liu, Fushan Wei, Chuangui Ma. 255-267 [doi]
- KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor NetworksZheng Gong, Qiang Tang, Yee Wei Law, Hongyang Chen. 268-283 [doi]
- Determining Parameters of Key Predistribution Schemes via Linear Codes in Wireless Sensor NetworksQi Chen, Dingyi Pei, Jun-Wu Dong. 284-299 [doi]
- Fully-Secure and Practical Sanitizable SignaturesJunqing Gong, Haifeng Qian, Yuan Zhou. 300-317 [doi]
- Rigorous Security Requirements for Designated Verifier SignaturesKazuki Yoneyama, Mebae Ushida, Kazuo Ohta. 318-335 [doi]
- Quasi-Dyadic CFS SignaturesPaulo S. L. M. Barreto, Pierre-Louis Cayrel, Rafael Misoczki, Robert Niebuhr. 336-349 [doi]
- Online/Offline Verification of Short SignaturesYilian Zhang, Zhide Chen, Fuchun Guo. 350-358 [doi]
- Acquiring Key Privacy from Data PrivacyRui Zhang 0002. 359-372 [doi]
- Private Information Retrieval with a Trusted Hardware Unit - RevisitedLukasz Krzywiecki, Miroslaw Kutylowski, Hubert Misztela, Tomasz Struminski. 373-386 [doi]
- Algebraic Precomputations in Differential and Integral CryptanalysisMartin Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret. 387-403 [doi]
- A Note on Fast Algebraic Attacks and Higher Order NonlinearitiesQichun Wang, Thomas Johansson. 404-414 [doi]
- Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on FactoringXiaofeng Chen, Haibo Tian, Fangguo Zhang, Yong Ding. 415-426 [doi]
- Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication ProtocolPedro Peris-Lopez, Julio César Hernández Castro, Raphael C.-W. Phan, Juan M. Estévez-Tapiador, Tieyan Li. 427-442 [doi]
- Dwork-Naor ZAP and Its Application in Deniable Authentication, ::::Revisited::::Shaoquan Jiang. 443-454 [doi]
- Efficient Online/Offline Signatures with Computational Leakage Resilience in Online PhaseFuchun Guo, Yi Mu, Willy Susilo. 455-470 [doi]
- Characterization of the Electromagnetic Side Channel in Frequency DomainOlivier Meynard, Denis Réal, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Frédéric Valette. 471-486 [doi]
- On Obfuscating Programs with Tamper-proof HardwareNing Ding, Dawu Gu. 487-502 [doi]
- DepSim: A Dependency-Based Malware Similarity Comparison SystemYi Yang, Lingyun Ying, Rui Wang, Purui Su, Dengguo Feng. 503-522 [doi]