Abstract is missing.
- Indifferentiable Hashing to Barreto-Naehrig CurvesPierre-Alain Fouque, Mehdi Tibouchi. 1-17 [doi]
- Semi-bent Functions with Multiple Trace Terms and Hyperelliptic CurvesSihem Mesnager. 18-36 [doi]
- Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime FieldsRodrigo Abarzúa, Nicolas Thériault. 37-55 [doi]
- Message-Based Traitor Tracing with Optimal Ciphertext RateDuong Hieu Phan, David Pointcheval, Mario Strefler. 56-77 [doi]
- Leakage-Resilient Spatial EncryptionMichel Abdalla, Jill-Jênn Vie. 78-99 [doi]
- On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols - PRF-ness alone Does Not Stop the Frauds!Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay. 100-120 [doi]
- Lattice-Based Hierarchical Inner Product EncryptionMichel Abdalla, Angelo De Caro, Karina Mochetti. 121-138 [doi]
- Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable HardwareThomas Pöppelmann, Tim Güneysu. 139-158 [doi]
- The Security Impact of a New Cryptographic LibraryDaniel J. Bernstein, Tanja Lange, Peter Schwabe. 159-176 [doi]
- Faster Implementation of Scalar Multiplication on Koblitz CurvesDiego F. Aranha, Armando Faz-Hernández, Julio López, Francisco Rodríguez-Henríquez. 177-193 [doi]
- Zero-Knowledge for Multivariate PolynomialsValérie Nachef, Jacques Patarin, Emmanuel Volte. 194-213 [doi]
- Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic FieldVanessa Dixon, Michael J. Jacobson Jr., Renate Scheidler. 214-233 [doi]
- UOWHFs from OWFs: Trading Regularity for EfficiencyKfir Barhum, Ueli Maurer. 234-253 [doi]
- Random Mappings with Restricted PreimagesAndrew MacFie, Daniel Panario. 254-270 [doi]
- On the Sosemanuk Related Key-IV SetsAleksandar Kircanski, Amr M. Youssef. 271-287 [doi]
- High Speed Implementation of Authenticated Encryption for the MSP430X MicrocontrollerConrado Porto Lopes Gouvêa, Julio López. 288-304 [doi]
- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-OutputBenedikt Gierlichs, Jörn-Marc Schmidt, Michael Tunstall. 305-321 [doi]