Abstract is missing.
- Analysis of Nonparametric Estimation Methods for Mutual Information AnalysisAlexandre Venelli. 1-15 [doi]
- Bias Analysis of a Certain Problem with Applications to E0 and Shannon CipherYi Lu 0002, Yvo Desmedt. 16-28 [doi]
- Known and Chosen Key Differential Distinguishers for Block CiphersIvica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld. 29-48 [doi]
- Related-Key Attack on the Full HIGHTBonwook Koo, Deukjo Hong, Daesung Kwon. 49-67 [doi]
- Preimage Attacks against PKC98-Hash and HAS-VYu Sasaki, Florian Mendel, Kazumaro Aoki. 68-91 [doi]
- Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID SystemsMohammad Reza Sohizadeh Abyaneh. 92-103 [doi]
- Cryptanalysis of RSA with Small Prime CombinationXianmeng Meng. 104-112 [doi]
- The Twin Bilinear Diffie-Hellman Inversion Problem and ApplicationsYu Chen, Liqun Chen. 113-132 [doi]
- Group Signatures are Suitable for Constrained DevicesSébastien Canard, Iwen Coisel, Giacomo de Meulenaer, Olivier Pereira. 133-150 [doi]
- A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LWShoichi Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida. 151-168 [doi]
- Efficient Pairing Computation on Elliptic Curves in Hessian FormHaihua Gu, Dawu Gu, WenLu Xie. 169-176 [doi]
- FPGA Implementation of an Improved Attack against the DECT Standard CipherMichael Weiner, Erik Tews, Benedikt Heinz, Johann Heyszl. 177-188 [doi]
- Chameleon: A Versatile Emulator for Contactless SmartcardsTimo Kasper, Ingo von Maurich, David Oswald, Christof Paar. 189-206 [doi]
- Revisiting Address Space RandomizationZhi Wang, Renquan Cheng, Debin Gao. 207-221 [doi]
- Evaluation of a Spyware Detection System Using Thin Client ComputingVasilis Pappas, Brian M. Bowen, Angelos D. Keromytis. 222-232 [doi]
- A Comparative Usability Evaluation of Traditional Password ManagersAmbarish Karole, Nitesh Saxena, Nicolas Christin. 233-251 [doi]
- An Adversarial Evaluation of Network Signaling and Control MechanismsKangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, Angelos D. Keromytis. 252-265 [doi]
- Secure Personalized Recommendation System for Mobile UserSoe Yu Maw. 266-277 [doi]
- Protecting White-Box AES with Dual CiphersMohamed Karroumi. 278-291 [doi]
- $\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure ChannelsBasel Alomair, Radha Poovendran. 292-310 [doi]
- On Equivalence Classes of Boolean FunctionsQichun Wang, Thomas Johansson. 311-324 [doi]
- Public Discussion Must Be Back and Forth in Secure Message TransmissionTakeshi Koshiba, Shinya Sawada. 325-337 [doi]
- Scalar Product-Based Distributed Oblivious TransferChristian L. F. Corniaux, Hossein Ghodosi. 338-354 [doi]
- Unconditionally Secure Rational Secret Sharing in Standard Communication NetworksZhifang Zhang, Mulan Liu. 355-369 [doi]
- Oblivious Transfer with Complex Attribute-Based Access ControlLingling Xu, Fangguo Zhang. 370-395 [doi]
- Fault Attacks on the Montgomery Powering LadderJörn-Marc Schmidt, Marcel Medwed. 396-406 [doi]
- First Principal Components Analysis: A New Side Channel DistinguisherYoussef Souissi, Maxime Nassar, Sylvain Guilley, Jean-Luc Danger, Florent Flament. 407-419 [doi]
- Fault Analysis on Stream Cipher MUGIJunko Takahashi, Toshinori Fukunaga, Kazuo Sakiyama. 420-434 [doi]