Abstract is missing.
- Broadcast Encryption with Multiple Trust AuthoritiesKent D. Boklan, Alexander W. Dent, Christopher A. Seaman. 1-19 [doi]
- Security of Sequential Multiple EncryptionAtsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito. 20-39 [doi]
- Mediated Traceable Anonymous EncryptionMalika Izabachène, David Pointcheval, Damien Vergnaud. 40-60 [doi]
- Starfish on StrikeDaniel J. Bernstein, Peter Birkner, Tanja Lange. 61-80 [doi]
- Estimating the Size of the Image of Deterministic Hash Functions to Elliptic CurvesPierre-Alain Fouque, Mehdi Tibouchi. 81-91 [doi]
- Fixed Argument PairingsCraig Costello, Douglas Stebila. 92-108 [doi]
- New Software Speed Records for Cryptographic PairingsMichael Naehrig, Ruben Niederhagen, Peter Schwabe. 109-123 [doi]
- Accelerating Lattice Reduction with FPGAsJérémie Detrey, Guillaume Hanrot, Xavier Pujol, Damien Stehlé. 124-143 [doi]
- Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction SetsDiego F. Aranha, Julio López, Darrel Hankerson. 144-161 [doi]
- Communication Optimal Multi-valued Asynchronous Broadcast ProtocolArpita Patra, C. Pandu Rangan. 162-177 [doi]
- On the Impossibility of Batch Update for Cryptographic AccumulatorsPhilippe Camacho, Alejandro Hevia. 178-188 [doi]
- On the Round Complexity of Zero-Knowledge Proofs Based on One-Way PermutationsS. Dov Gordon, Hoeteck Wee, David Xiao, Arkady Yerukhimovich. 189-204 [doi]
- Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256Çagdas Çalik, Meltem Sönmez Turan. 205-221 [doi]
- Generic Attacks on Misty SchemesValérie Nachef, Jacques Patarin, Joana Treger. 222-240 [doi]
- Cryptanalysis of the Hidden Matrix CryptosystemJean-Charles Faugère, Antoine Joux, Ludovic Perret, Joana Treger. 241-254 [doi]
- A Lattice-Based Threshold Ring Signature SchemePierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva. 255-272 [doi]
- Defeating Any Secret Cryptography with SCARE AttacksSylvain Guilley, Laurent Sauvage, Julien Micolod, Denis Réal, Frédéric Valette. 273-293 [doi]
- How Leaky Is an Extractor?François-Xavier Standaert. 294-304 [doi]
- Combined Implementation Attack Resistant ExponentiationJörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald. 305-322 [doi]