Abstract is missing.
- Horizontal and Vertical Side-Channel Attacks against Secure RSA ImplementationsAurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild. 1-17 [doi]
- Timing Attack against Protected RSA-CRT Implementation Used in PolarSSLCyril Arnaud, Pierre-Alain Fouque. 18-33 [doi]
- Fair Exchange of Short Signatures without Trusted Third PartyPhilippe Camacho. 34-49 [doi]
- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access StructuresCheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling, Huaxiong Wang. 50-67 [doi]
- A Robust and Plaintext-Aware Variant of Signed ElGamal EncryptionYannick Seurin, Joana Treger. 68-83 [doi]
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext AttacksShengli Liu, Jian Weng, Yunlei Zhao. 84-100 [doi]
- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment SchemesEduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering. 101-114 [doi]
- Randomized Partial Checking RevisitedShahram Khazaei, Douglas Wikström. 115-128 [doi]
- Randomly Failed! The State of Randomness in Current Java ImplementationsKai Michaelis, Christopher Meyer, Jörg Schwenk. 129-144 [doi]
- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for GrøstlSeverin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald, Wolfgang Wieser. 145-161 [doi]
- Collisions for the WIDEA-8 Compression FunctionFlorian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici. 162-173 [doi]
- Finding Collisions for Round-Reduced SM3Florian Mendel, Tomislav Nad, Martin Schläffer. 174-188 [doi]
- Many Weak Keys for PRINTcipher: Fast Key Recovery and CountermeasuresStanislav Bulygin, Michael Walter, Johannes Buchmann. 189-206 [doi]
- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC TagThomas Korak, Thomas Plos. 207-222 [doi]
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public RandomnessYu Yu, François-Xavier Standaert. 223-238 [doi]
- Cryptanalytic Attacks on MIFARE Classic ProtocolJovan Dj. Golic. 239-258 [doi]
- Asynchronous Computational VSS with Reduced Communication ComplexityMichael Backes, Amit Datta, Aniket Kate. 259-276 [doi]
- Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka. 277-292 [doi]
- Solving BDD by Enumeration: An UpdateMingjie Liu, Phong Q. Nguyen. 293-309 [doi]
- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker AssumptionsKaryn Benson, Hovav Shacham, Brent Waters. 310-325 [doi]
- Accountable Authority Identity-Based Encryption with Public TraceabilityJunzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng. 326-342 [doi]
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based EncryptionJae Hong Seo, Keita Emura. 343-358 [doi]
- The Low-Call Diet: Authenticated Encryption for Call Counting HSM UsersMike Bond, George French, Nigel P. Smart, Gaven J. Watson. 359-374 [doi]
- A Fully Homomorphic Cryptosystem with Approximate Perfect SecrecyMichal Hojsík, Veronika Pulpánová. 375-388 [doi]
- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential CryptanalysisJiqiang Lu, Wun-She Yap, Yongzhuang Wei. 389-404 [doi]