Abstract is missing.
- Slid Pairs in Salsa20 and TriviumDeike Priemuth-Schmid, Alex Biryukov. 1-14 [doi]
- New Directions in Cryptanalysis of Self-Synchronizing Stream CiphersShahram Khazaei, Willi Meier. 15-26 [doi]
- Analysis of RC4 and Proposal of Additional Layers for Better Security MarginSubhamoy Maitra, Goutam Paul. 27-39 [doi]
- New Results on the Key Scheduling Algorithm of RC4Mete Akgün, Pinar Kavak, Hüseyin Demirci. 40-52 [doi]
- Two Attacks on RadioGatúnDmitry Khovratovich. 53-66 [doi]
- Faster MulticollisionsJean-Philippe Aumasson. 67-77 [doi]
- A New Type of 2-Block Collisions in MD5Jirí Vábek, Daniel Joscák, Milan Bohácek, Jirí Tuma. 78-90 [doi]
- New Collision Attacks against Up to 24-Step SHA-2Somitra Kumar Sanadhya, Palash Sarkar. 91-103 [doi]
- Secure Hierarchical Identity Based Encryption Scheme in the Standard ModelYanli Ren, Dawu Gu. 104-115 [doi]
- A Fuzzy ID-Based Encryption Efficient When Error Rate Is LowJun Furukawa, Nuttapong Attrapadung, Ryuichi Sakai, Goichiro Hanaoka. 116-129 [doi]
- Type-Based Proxy Re-encryption and Its ConstructionQiang Tang. 130-144 [doi]
- Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based SignaturesLaila El Aimani. 145-157 [doi]
- Concrete Security for Entity Recognition: The Jane Doe ProtocolStefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff. 158-171 [doi]
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)Kazuki Yoneyama. 172-184 [doi]
- Round Efficient Unconditionally Secure Multiparty Computation ProtocolArpita Patra, Ashish Choudhary, C. Pandu Rangan. 185-199 [doi]
- A New Anonymous Password-Based Authenticated Key Exchange ProtocolJing Yang, Zhenfeng Zhang. 200-212 [doi]
- Group Key Management: From a Non-hierarchical to a Hierarchical StructureSébastien Canard, Amandine Jambert. 213-225 [doi]
- Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-MeasuresMukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay. 226-238 [doi]
- Floating Fault Analysis of TriviumMichal Hojsík, Bohuslav Rudolf. 239-250 [doi]
- Algebraic Methods in Side-Channel Collision Attacks and Practical Collision DetectionAndrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin. 251-265 [doi]
- New Related-Key Boomerang Attacks on AESMichael Gorski, Stefan Lucks. 266-278 [doi]
- New Impossible Differential Attacks on AESJiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim. 279-293 [doi]
- Reflection Cryptanalysis of Some CiphersOrhun Kara. 294-307 [doi]
- A Differential-Linear Attack on 12-Round SerpentOrr Dunkelman, Sebastiaan Indesteege, Nathan Keller. 308-321 [doi]
- New AES Software Speed RecordsDaniel J. Bernstein, Peter Schwabe. 322-336 [doi]
- A New Class of Weak Encryption Exponents in RSASubhamoy Maitra, Santanu Sarkar. 337-349 [doi]
- Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBCMridul Nandi. 350-362 [doi]
- Chai-Tea, Cryptographic Hardware Implementations of xTEAJens-Peter Kaps. 363-375 [doi]
- High Speed Compact Elliptic Curve Cryptoprocessor for FPGA PlatformsChester Rebeiro, Debdeep Mukhopadhyay. 376-388 [doi]
- More Discriminants with the Brezing-Weng MethodGaetan Bisson, Takakazu Satoh. 389-399 [doi]
- Another Approach to Pairing Computation in Edwards CoordinatesSorina Ionica, Antoine Joux. 400-413 [doi]
- A Verifiable Secret Sharing Scheme Based on the Chinese Remainder TheoremKamer Kaya, Ali Aydin Selçuk. 414-425 [doi]
- Secure Threshold Multi Authority Attribute Based Encryption without a Central AuthorityHuang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao. 426-436 [doi]