Abstract is missing.
- Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128Mohamed Tolba, Ahmed Abdelkhalek 0001, Amr M. Youssef. 3-17 [doi]
- Improved Linear Cryptanalysis of Round-Reduced ARIAAhmed Abdelkhalek 0001, Mohamed Tolba, Amr M. Youssef. 18-34 [doi]
- Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant BitsAtsushi Takayasu, Noboru Kunihiro. 35-47 [doi]
- Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group CommunicationJun Xu, Lei Hu, Xiaona Zhang, Liqiang Peng, Zhangjie Huang. 48-58 [doi]
- Enhanced Correlation Power Analysis by Biasing Power TracesChanghai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai, Na Pang. 59-72 [doi]
- Damaging, Simplifying, and Salvaging p-OMDTomer Ashur, Bart Mennink. 73-92 [doi]
- Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing ProtocolsFranziskus Kiefer, Mark Manulis. 95-114 [doi]
- Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2Lucjan Hanzlik, Miroslaw Kutylowski. 115-129 [doi]
- AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-CashBo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng. 130-146 [doi]
- Universally Composable Two-Server PAKEFranziskus Kiefer, Mark Manulis. 147-166 [doi]
- Yet Another Note on Block Withholding Attack on Bitcoin Mining PoolsSamiran Bag, Kouichi Sakurai. 167-180 [doi]
- Cyber Security Risk Assessment of a DDoS AttackGaute Wangen, Andrii Shalaginov, Christoffer Hallstensen. 183-202 [doi]
- Moving Target Defense Against Network Reconnaissance with Software Defined NetworkingLi Wang, Dinghao Wu. 203-217 [doi]
- Uni-ARBAC: A Unified Administrative Model for Role-Based Access ControlProsunjit Biswas, Ravi S. Sandhu, Ram Krishnan. 218-230 [doi]
- SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information SharingGeorge D. Webster, Zachary D. Hanif, Andre L. P. Ludwig, Tamas K. Lengyel, Apostolis Zarras, Claudia Eckert. 231-249 [doi]
- Leveraging Internet Services to Evade CensorshipApostolis Zarras. 253-270 [doi]
- Analyzing Randomized Response Mechanisms Under Differential PrivacyAtsushi Waseda, Ryo Nojima. 271-282 [doi]
- Models and Algorithms for Graph WatermarkingDavid Eppstein, Michael T. Goodrich, Jenny Lam, Nil Mamano, Michael Mitzenmacher, Manuel Torres. 283-301 [doi]
- Policy-Based Implicit Attestation for Microkernel-Based Virtualized SystemsSteffen Wagner, Claudia Eckert. 305-322 [doi]
- Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation MethodDongpeng Xu, Jiang Ming, Dinghao Wu. 323-342 [doi]
- A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability TestingGuanhua Yan, Yunus Kucuk, Max Slocum, David C. Last. 343-365 [doi]
- Control Flow Integrity Enforcement with Dynamic Code OptimizationYan Lin, Xiaoxiao Tang, Debin Gao, Jianming Fu. 366-385 [doi]
- Impossibility on the Provable Security of the Fiat-Shamir-Type Signatures in the Non-programmable Random Oracle ModelMasayuki Fukumitsu, Shingo Hasegawa. 389-407 [doi]
- Efficient Functional Encryption for Inner-Product Values with Full-Hiding SecurityJunichi Tomida, Masayuki Abe, Tatsuaki Okamoto. 408-425 [doi]
- MQSAS - A Multivariate Sequential Aggregate Signature SchemeRachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt. 426-439 [doi]
- Cryptanalysis of Multi-Prime \varPhi -Hiding AssumptionJun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng. 440-453 [doi]