Abstract is missing.
- Security of MD5 Challenge and Response: Extension of APOP Password Recovery AttackYu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro. 1-18 [doi]
- Cryptanalysis of a Hash Function Based on Quasi-cyclic CodesPierre-Alain Fouque, Gaëtan Leurent. 19-35 [doi]
- Linear-XOR and Additive Checksums Don t Protect Damgård-Merkle Hashes from Generic AttacksPraveen Gauravaram, John Kelsey. 36-51 [doi]
- Efficient Fully-Simulatable Oblivious TransferAndrew Y. Lindell. 52-70 [doi]
- Separation Results on the One-More Computational ProblemsEmmanuel Bresson, Jean Monnerat, Damien Vergnaud. 71-87 [doi]
- An Efficient Protocol for Fair Secure Two-Party ComputationMehmet S. Kiraz, Berry Schoenmakers. 88-105 [doi]
- Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random OraclesQiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo. 106-120 [doi]
- Legally-Enforceable Fairness in Secure Two-Party ComputationAndrew Y. Lindell. 121-137 [doi]
- Security of NMACand HMACBased on Non-malleabilityMarc Fischlin. 138-154 [doi]
- Aggregate Message Authentication CodesJonathan Katz, Andrew Y. Lindell. 155-169 [doi]
- Boosting AES Performance on a Tiny Processor CoreStefan Tillich, Christoph Herbst. 170-186 [doi]
- A Fast and Cache-Timing Resistant Implementation of the AESRobert Könighofer. 187-202 [doi]
- Identity-Based Threshold Key-Insulated Encryption without Random OraclesJian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu. 203-220 [doi]
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric EncryptionEike Kiltz, Yevgeniy Vahlis. 221-238 [doi]
- Public-Key Encryption with Non-interactive OpeningIvan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek. 239-255 [doi]
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSLOnur Aciiçmez, Werner Schindler. 256-273 [doi]
- Fault Analysis Study of IDEAChristophe Clavier, Benedikt Gierlichs, Ingrid Verbauwhede. 274-287 [doi]
- Susceptibility of UHF RFID Tags to Electromagnetic AnalysisThomas Plos. 288-300 [doi]
- Online/Offline Signature Schemes for Devices with Limited Computing CapabilitiesPing Yu, Stephen R. Tate. 301-317 [doi]
- RFID Security: Tradeoffs between Security and EfficiencyIvan Damgård, Michael Østergaard Pedersen. 318-332 [doi]
- Program Obfuscation and One-Time ProgramsShafi Goldwasser. 333-334 [doi]
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC FrameworkMichel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval. 335-351 [doi]
- Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key ExchangeStanislaw Jarecki, Jihye Kim, Gene Tsudik. 352-369 [doi]
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman. 370-386 [doi]
- Small Secret Key Attack on a Variant of RSA (Due to Takagi)Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa. 387-406 [doi]
- Super-Efficient Verification of Dynamic Outsourced DatabasesMichael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos. 407-424 [doi]
- A Latency-Free Election SchemeKristian Gjøsteen. 425-436 [doi]