Abstract is missing.
- Improved Integral Analysis on Tweaked LesamntaYu Sasaki, Kazumaro Aoki. 1-17 [doi]
- Analysis of Trivium Using Compressed Right Hand Side EquationsThorsten Ernst Schilling, Håvard Raddum. 18-32 [doi]
- Cryptanalysis of Round-Reduced HAS-160Florian Mendel, Tomislav Nad, Martin Schläffer. 33-47 [doi]
- An Efficient Method for Eliminating Random Delays in Power Traces of Embedded SoftwareDaehyun Strobel, Christof Paar. 48-60 [doi]
- An Efficient Leakage Characterization Method for Profiled Power Analysis AttacksHailong Zhang, Yongbin Zhou, Dengguo Feng. 61-73 [doi]
- Correcting Errors in Private Keys Obtained from Cold Boot AttacksHyung Tae Lee, HongTae Kim, Yoo-Jin Baek, Jung Hee Cheon. 74-87 [doi]
- Strong Security Notions for Timed-Release Public-Key Encryption RevisitedRyo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito. 88-108 [doi]
- Fully Secure Unidirectional Identity-Based Proxy Re-encryptionSong Luo, Qingni Shen, Zhong Chen. 109-126 [doi]
- Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity RecognitionYong Qiao, Yuexiang Yang, Jie He, Bo Liu, YingZhi Zeng. 127-139 [doi]
- AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day VulnerabilityKai Chen, Yifeng Lian, Yingjun Zhang. 140-154 [doi]
- Weaknesses in Current RSA Signature SchemesJuliane Krämer, Dmitry Nedospasov, Jean-Pierre Seifert. 155-168 [doi]
- Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic ImplementationsShuguo Yang, Yongbin Zhou, Jiye Liu, Danyang Chen. 169-185 [doi]
- A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked UsersKeita Emura, Atsuko Miyaji, Kazumasa Omote. 186-203 [doi]
- Generic Constructions for Verifiable SigncryptionLaila El Aimani. 204-218 [doi]
- Non-delegatable Strong Designated Verifier Signature on Elliptic CurvesHaibo Tian, Xiaofeng Chen 0001, Zhengtao Jiang, Yusong Du. 219-234 [doi]
- An Improved Known Plaintext Attack on PKZIP Encryption AlgorithmKyung Chul Jeong, Dong Hoon Lee 0002, Daewan Han. 235-247 [doi]
- Synthetic Linear Analysis: Improved Attacks on CubeHash and RabbitYi Lu 0002, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang. 248-260 [doi]
- On the Resistance of Boolean Functions against Fast Algebraic AttacksYusong Du, Fangguo Zhang, Meicheng Liu. 261-274 [doi]
- CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard ModelYu Chen, Liqun Chen, Zongyang Zhang. 275-301 [doi]
- Design, Implementation, and Evaluation of a Vehicular Hardware Security ModuleMarko Wolf, Timo Gendrullis. 302-318 [doi]
- Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service ProtectionJothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto. 319-331 [doi]
- Implementing Information-Theoretically Secure Oblivious Transfer from Packet ReorderingPaolo Palmieri, Olivier Pereira. 332-345 [doi]
- Compression Functions Using a Dedicated Blockcipher for Lightweight HashingShoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida. 346-364 [doi]
- Biclique Attack on the Full HIGHTDeukjo Hong, Bonwook Koo, Daesung Kwon. 365-374 [doi]
- Preimage Attacks on Step-Reduced SM3 Hash FunctionJian Zou, Wenling Wu, Shuang Wu, Bozhan Su, Le Dong. 375-390 [doi]
- Breaking a 3D-Based CAPTCHA SchemeVu Duc Nguyen, Yang-Wai Chow, Willy Susilo. 391-405 [doi]
- Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access ControlFangming Zhao, Takashi Nishide, Kouichi Sakurai. 406-418 [doi]
- Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption SchemesZhenfei Zhang, Thomas Plantard, Willy Susilo. 419-436 [doi]
- A Blind Digital Image Watermarking Method Based on the Dual-Tree Complex Discrete Wavelet Transform and Interval ArithmeticTeruya Minamoto, Ryuji Ohura. 437-449 [doi]
- On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous NetworksAshish Choudhury, Arpita Patra. 450-466 [doi]
- Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random OraclesKazuki Yoneyama. 467-489 [doi]
- Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret KeysAtsushi Fujioka, Koutarou Suzuki. 490-509 [doi]