Abstract is missing.
- Rate-One AE with Security Under RUPShoichi Hirose, Yu Sasaki, Kan Yasuda. 3-20 [doi]
- An Improved SAT-Based Guess-and-Determine Attack on the Alternating Step GeneratorOleg Zaikin, Stepan Kochemazov. 21-38 [doi]
- Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean SharesDaniel Dinu, Johann Großschädl, Yann Le Corre. 39-57 [doi]
- Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block CiphersLi Lin, Wenling Wu, Yafei Zheng. 58-76 [doi]
- Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRUDung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi. 79-91 [doi]
- Zero-Knowledge Password Policy Check from LatticesKhoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang. 92-113 [doi]
- Generic Forward-Secure Key Agreement Without SignaturesCyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi. 114-133 [doi]
- A Constant-Size Signature Scheme with Tighter Reduction from CDH AssumptionKaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki. 137-154 [doi]
- Homomorphic-Policy Attribute-Based Key Encapsulation MechanismsJérémy Chotard, Duong Hieu Phan, David Pointcheval. 155-172 [doi]
- Watermarking Public-Key Cryptographic Functionalities and ImplementationsFoteini Baldimtsi, Aggelos Kiayias, Katerina Samari. 173-191 [doi]
- Contactless Access Control Based on Distance BoundingHandan Kilinç, Serge Vaudenay. 195-213 [doi]
- Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant AnalysisLam Tran, Thang Hoang, Thuc Dinh Nguyen, Deokjai Choi. 214-229 [doi]
- Low-Level Attacks in Bitcoin WalletsAndriana Gkaniatsou, Myrto Arapinis, Aggelos Kiayias. 233-253 [doi]
- Improving Password Guessing Using Byte Pair EncodingXingxing Wang, Dakui Wang, Xiaojun Chen 0004, Rui Xu, Jinqiao Shi, Li Guo. 254-268 [doi]
- How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask AttackXueyi Yang, Limin Liu, Lingchen Zhang, Weiyu Jiang, Shiran Pan. 269-287 [doi]
- Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging AttacksWeizhi Meng, Fei-Fei, Wenjuan Li, Man Ho Au. 291-308 [doi]
- A Differentially Private Encryption SchemeCarlo Brunetta, Christos Dimitrakakis, Bei Liang, Aikaterini Mitrokotsa. 309-326 [doi]
- Droid Mood Swing (DMS): Automatic Security Modes Based on ContextsMd. Shahrear Iqbal, Mohammad Zulkernine. 329-347 [doi]
- T-MAC: Protecting Mandatory Access Control System Integrity from Malicious Execution Environment on ARM-Based Mobile DevicesDiming Zhang, Liangqiang Chen, Fei Xue, Hao Wu, Hao Huang. 348-365 [doi]
- Enforcing ACL Access Control on Android PlatformXiaohai Cai, Xiaozhuo Gu, Yuewu Wang, Quan Zhou, Zhenhuan Cao. 366-383 [doi]
- Nightingale: Translating Embedded VM Code in x86 Binary ExecutablesHaijiang Xie, Yuanyuan Zhang, Juanru Li, Dawu Gu. 387-404 [doi]
- Run-Time Verification for Observational Determinism Using Dynamic Program SlicingMohammad Ghorbani, Mehran S. Fallah. 405-416 [doi]
- Automated Analysis of AccountabilityAlessandro Bruni, Rosario Giustolisi, Carsten Schürmann. 417-434 [doi]
- Visualization of Intrusion Detection Alarms Collected from Multiple NetworksBoyeon Song, Sang-soo Choi, JangWon Choi, Jungsuk Song. 437-454 [doi]
- Curtain: Keep Your Hosts Away from USB AttacksJianming Fu, Jianwei Huang, Lanxin Zhang. 455-471 [doi]