Abstract is missing.
- On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages UnknownLidong Han, Wei Wei, Mingjie Liu. 1-9 [doi]
- Differential Fault Analysis of TwofishSubidh Ali, Debdeep Mukhopadhyay. 10-28 [doi]
- Improved Differential Cache Attacks on SMS4Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay, Huaxiong Wang. 29-45 [doi]
- An Extension of Fault Sensitivity Analysis Based on Clockwise CollisionYang Li, Kazuo Ohta, Kazuo Sakiyama. 46-59 [doi]
- A Robust Fuzzy Extractor without ECCsJintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou. 60-68 [doi]
- An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous ChannelsYang Yu, Zhanfei Zhou. 69-89 [doi]
- Visual Cryptography for Natural Images and Visual VotingTeng Guo, Feng Liu, Chuan-Kun Wu. 90-101 [doi]
- RCCA Security for KEM+DEM Style Hybrid EncryptionsYuan Chen, Qingkuan Dong. 102-121 [doi]
- Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine EquationsJintai Ding, Ai Ren, Chengdong Tao. 122-136 [doi]
- Verifiable Structured EncryptionMoesfa Soeheila Mohamad, Geong Sen Poh. 137-156 [doi]
- Nested Merkle's Puzzles against Sampling AttacksShlomi Dolev, Nova Fandina, XiMing Li. 157-174 [doi]
- Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBCMichael Walter, Stanislav Bulygin, Johannes Buchmann. 175-197 [doi]
- A General Model for MAC Generation Using Direct InjectionHarry Bartlett, Mufeed Juma AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong. 198-215 [doi]
- Collision Attacks on Variant of OCB Mode and Its SeriesZhelei Sun, Peng Wang, Liting Zhang. 216-224 [doi]
- The Security and Performance of "GCM" when Short Multiplications Are Used InsteadKazumaro Aoki, Kan Yasuda. 225-245 [doi]
- Estimating Resistance against Multidimensional Linear Attacks: An Application on DEANRisto M. Hakala, Atle Kivelä, Kaisa Nyberg. 246-262 [doi]
- Fast Evaluation of T-Functions via Time-Memory Trade-OffsTao Shi, Vladimir Anashin, Dongdai Lin. 263-275 [doi]
- Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic AttacksTianZe Wang, Meicheng Liu, Dongdai Lin. 276-293 [doi]
- An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream GeneratorsLin Jiao, Mingsheng Wang, Bin Zhang, Yongqiang Li. 294-310 [doi]
- New Sequences of Period p n and p n + 1 via Projective Linear GroupsLin Wang, Zhi Hu. 311-330 [doi]
- Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile PhonesYuxin Meng, Duncan S. Wong, Roman Schlegel, Lam-for Kwok. 331-350 [doi]
- Secure Product Tracking in Supply ChainMehdi Khalfaoui, Refik Molva, Laurent Gomez. 351-370 [doi]
- The Bussard-Bagga and Other Distance-Bounding Protocols under AttacksAsli Bay, Ioana Boureanu, Aikaterini Mitrokotsa, Iosif Spulber, Serge Vaudenay. 371-391 [doi]