Abstract is missing.
- Secure Parameters for SWIFFTJohannes Buchmann, Richard Lindner. 1-17 [doi]
- FSBdayDaniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe. 18-38 [doi]
- Reusing Static Keys in Key Agreement ProtocolsSanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu. 39-56 [doi]
- A Study of Two-Party Certificateless Authenticated Key-Agreement ProtocolsColleen Swanson, David Jao. 57-71 [doi]
- Fault Analysis of Rabbit: Toward a Secret Key LeakageAlexandre Berzati, Cécile Canovas-Dumas, Louis Goubin. 72-87 [doi]
- On Physical Obfuscation of Cryptographic AlgorithmsJulien Bringer, Hervé Chabanne, Thomas Icart. 88-103 [doi]
- Cache Timing Attacks on ClefiaChester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga. 104-118 [doi]
- Software Oriented Stream Ciphers Based upon FCSRs in Diversified ModeThierry P. Berger, Marine Minier, Benjamin Pousse. 119-135 [doi]
- On the Symmetric Negabent Boolean FunctionsSumanta Sarkar. 136-143 [doi]
- Improved Meet-in-the-Middle Attacks on AESHüseyin Demirci, Ihsan Taskin, Mustafa Çoban, Adnan Baysal. 144-156 [doi]
- Related-Key Rectangle Attack of the Full HAS-160 Encryption ModeOrr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks. 157-168 [doi]
- Second Preimage Attack on SHAMATA-512Kota Ideguchi, Dai Watanabe. 169-181 [doi]
- Towards Secure and Practical MACs for Body Sensor NetworksZheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu. 182-198 [doi]
- Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain ExtensionsRishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi. 199-218 [doi]
- A Distinguisher for the Compression Function of SIMD-512Florian Mendel, Tomislav Nad. 219-232 [doi]
- Sampling from Signed Quadratic Residues: RSA Group Is PseudofreeMahabir Prasad Jhanwar, Rana Barua. 233-247 [doi]
- Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 MicrocontrollerConrado Porto Lopes Gouvêa, Julio López. 248-262 [doi]
- A New Hard-Core Predicate of Paillier s Trapdoor FunctionDong Su, Kewei Lv. 263-271 [doi]
- Private Interrogation of Devices via Identification CodesJulien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji. 272-289 [doi]
- RFID Distance Bounding Multistate EnhancementGildas Avoine, Christian Floerkemeier, Benjamin Martin 0002. 290-307 [doi]
- Two Attacks against the ::::F::::::::::f:::::: RFID ProtocolOlivier Billet, Kaoutar Elkhiyaoui. 308-320 [doi]
- Efficient Constructions of Signcryption Schemes and Signcryption ComposabilityTakahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt. 321-342 [doi]
- On Generic Constructions of Designated Confirmer SignaturesLaila El Aimani. 343-362 [doi]
- Verifiably Encrypted Signatures from RSA without NIZKsMarkus Rückert. 363-377 [doi]
- Identity Based Aggregate Signcryption SchemesS. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan. 378-397 [doi]
- Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal ResilienceArpita Patra, Ashish Choudhary, C. Pandu Rangan. 398-417 [doi]
- Non-committing Encryptions Based on Oblivious Naor-Pinkas CryptosystemsHuafei Zhu, Feng Bao. 418-429 [doi]
- Oblivious Multi-variate Polynomial EvaluationGérald Gavin, Marine Minier. 430-442 [doi]