Abstract is missing.
- Tor and the Censorship Arms Race: Lessons LearnedRoger Dingledine. 1 [doi]
- Elliptic Curves for ApplicationsTanja Lange. 2 [doi]
- PKDPA: An Enhanced Probabilistic Differential Power Attack MethodologyDhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury. 3-21 [doi]
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel AttacksMaxime Nassar, Sylvain Guilley, Jean-Luc Danger. 22-39 [doi]
- Square Always ExponentiationChristophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil. 40-57 [doi]
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache LinesChester Rebeiro, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay. 58-75 [doi]
- Partial Key Exposure: Generalized Framework to Attack RSASantanu Sarkar. 76-92 [doi]
- The Yin and Yang Sides of Embedded SecurityChristof Paar. 93 [doi]
- Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-ScheduleMichael Gorski, Thomas Knapke, Eik List, Stefan Lucks, Jakob Wenzel. 94-113 [doi]
- Linear Cryptanalysis of PRINTcipher - Trails and Samples EverywhereMartin Ågren, Thomas Johansson. 114-133 [doi]
- Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEINJean-Philippe Aumasson, María Naya-Plasencia, Markku-Juhani O. Saarinen. 134-145 [doi]
- On Related-Key Attacks and KASUMI: The Case of A5/3Phuong Ha Nguyen, Matthew J. B. Robshaw, Huaxiong Wang. 146-159 [doi]
- Cryptology: Where Is the New Frontier?Ross Anderson. 160 [doi]
- Analysis of the Parallel Distinguished Point TradeoffJin Hong 0001, Ga-won Lee, Daegun Ma. 161-180 [doi]
- On the Evolution of GGHN CipherSubhadeep Banik, Subhamoy Maitra, Santanu Sarkar. 181-195 [doi]
- HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream CiphersSourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid. 196-215 [doi]
- Addressing Flaws in RFID Authentication ProtocolsMohammad Hassan Habibi, Mohammad Reza Aref, Di Ma. 216-235 [doi]
- Practical Analysis of Reduced-Round KeccakMaría Naya-Plasencia, Andrea Röck, Willi Meier. 236-254 [doi]
- Boomerang Distinguisher for the SIMD-512 Compression FunctionFlorian Mendel, Tomislav Nad. 255-269 [doi]
- Lightweight Implementations of SHA-3 Candidates on FPGAsJens-Peter Kaps, Panasayya Yalla, Kishore Kumar Surapathi, Bilal Habib, Susheel Vadlamudi, Smriti Gurung, John Pham. 270-289 [doi]
- Publicly Verifiable Secret Sharing for Cloud-Based Key ManagementRoy D'Souza, David Jao, Ilya Mironov, Omkant Pandey. 290-309 [doi]
- On Constructing Families of Pairing-Friendly Elliptic Curves with Variable DiscriminantRobert Drylo. 310-319 [doi]
- Attractive Subfamilies of BLS Curves for Implementing High-Security PairingsCraig Costello, Kristin Lauter, Michael Naehrig. 320-342 [doi]
- Stone Knives and Bear Skins: Why Does the Internet Run on Pre-historic Cryptography?Eric Rescorla. 343 [doi]
- The Limits of Common Coins: Further ResultsHemanta K. Maji, Manoj Prabhakaran. 344-358 [doi]
- Secure Message Transmission in Asynchronous Directed GraphsShashank Agrawal, Abhinav Mehta, Kannan Srinathan. 359-378 [doi]
- Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward SecrecyLakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto. 379-398 [doi]
- Software Optimizations for Cryptographic Primitives on General Purpose x86_64 PlatformsShay Gueron. 399-400 [doi]