Abstract is missing.
- Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based EncryptionTakahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. 1-19 [doi]
- Distributed Attribute-Based EncryptionSascha Müller, Stefan Katzenbeisser, Claudia Eckert. 20-36 [doi]
- Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime FactorsSantanu Sarkar, Subhamoy Maitra. 37-51 [doi]
- Simple Algorithms for Computing a Sequence of 2-IsogeniesReo Yoshida, Katsuyuki Takashima. 52-65 [doi]
- Survival in the Wild: Robust Group Key Agreement in Wide-Area NetworksJihye Kim, Gene Tsudik. 66-83 [doi]
- Visual Secret Sharing Schemes with Cyclic Access Structure for Many ImagesMiyuki Uno, Mikio Kano. 84-97 [doi]
- The Swiss-Knife RFID Distance Bounding ProtocolChong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira. 98-115 [doi]
- Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation TechniqueJafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili. 116-133 [doi]
- Anonymous Fingerprinting for Predelivery of ContentsKazuhiro Haramura, Maki Yoshida, Toru Fujiwara. 134-151 [doi]
- Instruction Set Limitation in Support of Software DiversityBjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet, Koen De Bosschere. 152-165 [doi]
- Non-interactive Identity-Based DNF Signature Scheme and Its ExtensionsKwangsu Lee, Jung Yeon Hwang, Dong-Hoon Lee. 166-183 [doi]
- How to Balance Privacy with AuthenticityPairat Thorncharoensri, Willy Susilo, Yi Mu. 184-201 [doi]
- Efficient Vote Validity Check in Homomorphic Electronic VotingKun Peng, Feng Bao. 202-217 [doi]
- Secure Hardware Implementation of Non-linear Functions in the Presence of GlitchesSvetla Nikova, Vincent Rijmen, Martin Schläffer. 218-234 [doi]
- Novel PUF-Based Error Detection Methods in Finite State MachinesGhaith Hammouri, Kahraman Akdemir, Berk Sunar. 235-252 [doi]
- Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS DevicesFrançois-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede. 253-267 [doi]
- A Single-Key Domain Extender for Privacy-Preserving MACs and PRFsKan Yasuda. 268-285 [doi]
- Extended Models for Message AuthenticationLiting Zhang, Wenling Wu, Peng Wang. 286-301 [doi]
- A Preimage Attack for 52-Step HAS-160Yu Sasaki, Kazumaro Aoki. 302-317 [doi]
- Essentially Optimal Universally Composable Oblivious TransferIvan Damgård, Jesper Buus Nielsen, Claudio Orlandi. 318-335 [doi]
- Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data ClassificationAhmad-Reza Sadeghi, Thomas Schneider. 336-353 [doi]
- Proving a Shuffle Using Representations of the Symmetric GroupSoojin Cho, Manpyo Hong. 354-367 [doi]
- On Formal Verification of Arithmetic-Based Cryptographic PrimitivesDavid Nowak. 368-382 [doi]
- A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round SerpentJoo Yeon Cho, Miia Hermelin, Kaisa Nyberg. 383-398 [doi]
- Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic CryptanalysisEnes Pasalic. 399-414 [doi]
- Higher Order Differential Attacks on Reduced-Round MISTY1Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata. 415-431 [doi]