Abstract is missing.
- Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient SolutionsOlivier Blazy, Céline Chevalier, Damien Vergnaud. 3-18 [doi]
- Strongly Leakage-Resilient Authenticated Key ExchangeRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo. 19-36 [doi]
- INT-RUP Analysis of Block-cipher Based Authenticated Encryption SchemesAvik Chakraborti, Nilanjan Datta, Mridul Nandi. 39-54 [doi]
- From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLSColin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila. 55-71 [doi]
- Dynamic Symmetric Searchable Encryption from Constrained Functional EncryptionSebastian Gajek. 75-89 [doi]
- Private Large-Scale Databases with Distributed Searchable Symmetric EncryptionYuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky. 90-107 [doi]
- Short Randomizable SignaturesDavid Pointcheval, Olivier Sanders. 111-126 [doi]
- Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable LinkabilityOlivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer. 127-143 [doi]
- Hybrid Publicly Verifiable ComputationJames Alderman, Christian Janson, Carlos Cid, Jason Crampton. 147-163 [doi]
- Efficient Concurrent Covert Computation of String Equality and Set IntersectionChongwon Cho, Dana Dachman-Soled, Stanislaw Jarecki. 164-179 [doi]
- Secure Audit Logs with Verifiable ExcerptsGunnar Hartung. 183-199 [doi]
- Efficient Culpably Sound NIZK Shuffle Argument Without Random OraclesPrastudy Fauzi, Helger Lipmaa. 200-216 [doi]
- ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCsDaniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer. 219-235 [doi]
- Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android SmartphonesPierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi. 236-252 [doi]
- Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit ReliabilityPeter Pessl, Stefan Mangard. 255-270 [doi]
- Towards a Unified Security Model for Physically Unclonable FunctionsFrederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung. 271-287 [doi]
- Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014Yanbin Pan. 291-304 [doi]
- Short Structure-Preserving SignaturesEssam Ghadafi. 305-321 [doi]
- Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?Ana Costache, Nigel P. Smart. 325-340 [doi]
- NFLlib: NTT-Based Fast Lattice LibraryCarlos Aguilar Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint. 341-356 [doi]
- Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate ModelingZhen Li. 359-377 [doi]
- New Observations on Piccolo Block CipherYanfeng Wang, Wenling Wu. 378-393 [doi]
- Replacing SHA-2 with SHA-3 Enhances Generic Security of HMACYusuke Naito, Lei Wang 0031. 397-412 [doi]
- Constrained PRFs for Unbounded InputsHamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak. 413-428 [doi]
- Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding SchemesJohannes Blömer, Gennadij Liske. 431-447 [doi]
- Factoring N=p^rq^s for Large r and sJean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun. 448-464 [doi]