Abstract is missing.
- Numerical Semigroups and Bounds on Impossible Differential Attacks on Generalized Feistel SchemesMarina Pudovkina, Alexander Toktarev. 1-11 [doi]
- Encrypting Huffman-Encoded Data by Substituting Pairs of Code Words without Changing the Bit Count of a PairMarek Parfieniuk, Piotr Jankowski. 12-22 [doi]
- On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible DecompositionUrszula Romanczuk-Polubiec, Vasyl Ustimenko. 23-37 [doi]
- Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number GeneratorsOmar Reyad, Zbigniew Kotulski. 38-48 [doi]
- Identity-Based Cryptography in Credit Card PaymentsKimmo Halunen, Mirko Sailio. 49-58 [doi]
- On a Cipher Based on Pseudo-random Walks on GraphsWit Forys, Lukasz Jeda, Piotr Oprocha. 59-73 [doi]
- On LDPC Codes Based on Families of Expanding Graphs of Increasing Girth without Edge-Transitive Automorphism GroupsMonika Polak, Vasyl Ustimenko. 74-88 [doi]
- Analysis of the Data Flow in the Newscast Protocol for Possible VulnerabilitiesJakub Muszynski, Sébastien Varrette, Juan Luís Jiménez Laredo, Pascal Bouvry. 89-99 [doi]
- Efficient Verifiable Multi-Secret Sharing Based on Y.C.H SchemeAppala Naidu Tentu, Allam Appa Rao. 100-109 [doi]
- A Lightweight Authentication Protocol for RFIDFerucio Laurentiu Tiplea. 110-121 [doi]
- Long-Term Secure Two-Round Group Key Establishment from PairingsKashi Neupane. 122-130 [doi]
- Optimizing SHA256 in Bitcoin MiningNicolas T. Courtois, Marek Grajek, Rahul Naik. 131-144 [doi]
- Protocol for Detection of Counterfeit Transactions in Electronic Currency ExchangeMarek R. Ogiela, Piotr Sulkowski. 145-152 [doi]
- Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile DevicesImed El Fray, Tomasz Hyla, Miroslaw Kurkowski, Witold Mackow, Jerzy Pejas. 153-165 [doi]
- Secure Multihop Key Establishment Protocols for Wireless Sensor NetworksIsmail Mansour, Gérard Chalhoub, Pascal Lafourcade. 166-177 [doi]
- Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-MLKatarzyna Mazur, Bogdan Ksiezopolski. 178-192 [doi]
- Context-Aware Secure Routing Protocol for Real-Time ServicesGrzegorz Orynczak, Zbigniew Kotulski. 193-207 [doi]