Abstract is missing.
- Can a Program Reverse-Engineer Itself?Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion. 1-9 [doi]
- Improved Key Generation for Gentry's Fully Homomorphic Encryption SchemePeter Scholl, Nigel P. Smart. 10-22 [doi]
- On Constructing Homomorphic Encryption Schemes from Coding TheoryFrederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi. 23-40 [doi]
- Generalised Complementary ArraysMatthew G. Parker, Constanza Riera. 41-60 [doi]
- Binary Kloosterman Sums with Value 4Jean-Pierre Flori, Sihem Mesnager, Gérard D. Cohen. 61-78 [doi]
- On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2 i + 1, 2 j + 1}Vincent Herbert, Sumanta Sarkar. 79-96 [doi]
- A Secure and Efficient Proof of Integer in an Interval RangeKun Peng. 97-111 [doi]
- Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal ConstructionJunji Shikata, Daisuke Yamanaka. 112-131 [doi]
- Self-correctors for Cryptographic ModulesGo Yamamoto, Tetsutaro Kobayashi. 132-151 [doi]
- The Symbiosis between Collision and Preimage ResistanceElena Andreeva, Martijn Stam. 152-171 [doi]
- Enhanced Count of Balanced Symmetric Functions and Balanced Alternating FunctionsMarc Mouffron, Guillaume Vergne. 172-189 [doi]
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user SettingMitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai, Kazuo Ohta. 190-209 [doi]
- Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with AuthenticityYuki Shibuya, Junji Shikata. 210-229 [doi]
- A Note on the Dual Codes of Module Skew CodesDelphine Boucher, Felix Ulmer. 230-243 [doi]
- Ensuring Message Embedding in Wet Paper SteganographyDaniel Augot, Morgan Barbier, Caroline Fontaine. 244-258 [doi]
- On the Stability of m-SequencesAlex J. Burrage, Ana Salagean, Raphael C.-W. Phan. 259-274 [doi]
- Parallelizing the Weil and Tate PairingsDiego F. Aranha, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez. 275-295 [doi]
- On the Efficient Implementation of Pairing-Based ProtocolsMichael Scott. 296-308 [doi]
- Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2Xusheng Zhang, Dongdai Lin. 309-326 [doi]
- Improved Precomputation Scheme for Scalar Multiplication on Elliptic CurvesDuc-Phong Le, Chik-How Tan. 327-343 [doi]
- Breaking an Identity-Based Encryption Scheme Based on DHIESMartin R. Albrecht, Kenneth G. Paterson. 344-355 [doi]
- Analysis of the SSH Key Exchange ProtocolStephen C. Williams. 356-374 [doi]
- Cryptanalysis of the Light-Weight Cipher A2U2Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner, Mathieu David. 375-390 [doi]
- Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 ProposalKazuhiko Minematsu, Tetsu Iwata. 391-412 [doi]
- Security of Hash-then-CBC Key Wrapping RevisitedYasushi Osaki, Tetsu Iwata. 413-430 [doi]
- Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesMalika Izabachène, Benoît Libert, Damien Vergnaud. 431-450 [doi]
- On Forward Secrecy in One-Round Key ExchangeColin Boyd, Juanma González Nieto. 451-468 [doi]
- Designated Confirmer Signatures with Unified VerificationGuilin Wang, Fubiao Xia, Yunlei Zhao. 469-495 [doi]