Abstract is missing.
- Adaptively Secure Forward-Secure Non-interactive Threshold CryptosystemsBenoƮt Libert, Moti Yung. 1-21 [doi]
- Cryptanalysis vs. Provable SecurityPhong Q. Nguyen. 22-23 [doi]
- Boosting Scalability in Anomaly-Based Packed Executable FilteringXabier Ugarte-Pedrero, Igor Santos, Pablo Garcia Bringas. 24-43 [doi]
- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic GraphsLin Wang, Bing Shen, TongXu Qiao. 44-56 [doi]
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear ProgrammingNicky Mouha, Qingju Wang, Dawu Gu, Bart Preneel. 57-76 [doi]
- Adleman-Manders-Miller Root Extraction Method RevisitedZhengjun Cao, Qian Sha, Xiao Fan. 77-85 [doi]
- Multi-pixel Encryption Visual CryptographyTeng Guo, Feng Liu, Chuan-Kun Wu. 86-92 [doi]
- An Improved Electronic Voting Scheme without a Trusted Random Number GeneratorYining Liu, Peiyong Sun, Jihong Yan, Yajun Li, Jianyu Cao. 93-101 [doi]
- Fault Attacks against the Miller Algorithm in Hessian CoordinatesJiang Weng, Yunqi Dou, Chuangui Ma. 102-112 [doi]
- Benchmarking for Steganography by Kernel Fisher Discriminant CriterionWei Huang, Xianfeng Zhao, Dengguo Feng, Rennong Sheng. 113-130 [doi]
- Improved Tradeoff between Encapsulation and Decapsulation of HK09Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu. 131-141 [doi]
- Non-interactive Deniable Authentication ProtocolsHaibo Tian, Xiaofeng Chen 0001, Zhengtao Jiang. 142-159 [doi]
- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3Haixin Song, Xiubin Fan, Chuankun Wu, Dengguo Feng. 160-178 [doi]
- Efficient Self-certified Signatures with Batch VerificationNan Li, Yi Mu, Willy Susilo. 179-194 [doi]
- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive OpeningJiang Zhang, Xiang Xie, Rui Zhang 0002, Zhenfeng Zhang. 195-209 [doi]
- Fast Tate Pairing Computation on Twisted Jacobi Intersections CurvesXusheng Zhang, Shan Chen, Dongdai Lin. 210-226 [doi]
- Weak-Key Class of MISTY1 for Related-Key Differential AttackYi-bin Dai, Shao-zhen Chen. 227-236 [doi]
- Cryptanalysis of Reduced-Round KLEIN Block CipherXiaoli Yu, Wenling Wu, Yanjun Li, Lei Zhang 0012. 237-250 [doi]
- An Efficient RSA Implementation without PrecomputationWuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, Meng Yu. 251-268 [doi]
- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and CountermeasuresGautham Sekar. 269-288 [doi]
- Batching Multiple Protocols to Improve Efficiency of Multi-Party ComputationNaoto Kiribuchi, Ryo Kato, Takashi Nishide, Hiroshi Yoshiura. 289-308 [doi]
- Towards Attack Resilient Social Network Based Threshold SigningJian Zhou, Ji Xiang, Neng Gao. 309-323 [doi]
- A Ciphertext Policy Attribute-Based Encryption Scheme without PairingsJiang Zhang, Zhenfeng Zhang. 324-340 [doi]
- Cryptanalysis of Randomized Arithmetic Codes Based on Markov ModelLiang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai. 341-362 [doi]
- Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way FunctionGuifang Huang, Lei Hu. 363-378 [doi]
- Pseudorandom Generators Based on Subcovers for Finite GroupsChenggen Song, MaoZhi Xu, Chunming Tang. 379-392 [doi]