Abstract is missing.
- The Case For Human Primacy in Cryptography - (Summary from the Keynote Lecture)Xavier Boyen. 3-10 [doi]
- Time for a Paradigm Shift in Our Disciplinary Culture?Neal Koblitz. 11-18 [doi]
- Another Look at Tightness II: Practical Issues in CryptographySanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar. 21-55 [doi]
- Another Look at Anonymous Communication - Security and Modular ConstructionsRussell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow, Anthony Man-Cho So. 56-82 [doi]
- Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based CryptographyAlfred Menezes, Palash Sarkar, Shashank Singh 0001. 83-108 [doi]
- Key Recovery: Inert and PublicColin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines. 111-126 [doi]
- Honey Encryption for Language - Robbing Shannon to Pay Turing?Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache. 127-144 [doi]
- Randomized Stopping Times and Provably Secure Pseudorandom Permutation GeneratorsMichal Kulis, Pawel Lorek, Filip Zagórski. 145-167 [doi]
- A Virtual Wiretap Channel for Secure Message TransmissionSetareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin. 171-192 [doi]
- Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output FunctionsDanny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone. 193-211 [doi]
- Controlled Randomness - A Defense Against Backdoors in Cryptographic DevicesLucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski. 215-232 [doi]
- Malware, Encryption, and Rerandomization - Everything Is Under AttackHerman Galteland, Kristian Gjøsteen. 233-251 [doi]
- Protecting Electronic Signatures in Case of Key LeakageMiroslaw Kutylowski, Jacek Cichon, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen, Jianfeng Wang. 252-274 [doi]
- A New Test Statistic for Key Recovery Attacks Using Multiple Linear ApproximationsSubhabrata Samajder, Palash Sarkar. 277-293 [doi]
- Tuple Cryptanalysis: Slicing and Fusing MultisetsMarine Minier, Raphael C.-W. Phan. 294-320 [doi]
- Improvements of Attacks on Various Feistel SchemesEmmanuel Volte, Valérie Nachef, Nicolas Marrière. 321-344 [doi]
- Updatable Functional EncryptionAfonso Arriaga, Vincenzo Iovino, Qiang Tang 0001. 347-363 [doi]
- Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation ChecksDaniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer. 364-388 [doi]
- CARIBE: Cascaded IBE for Maximum Flexibility and User-Side ControlBritta Hale, Christopher Carr, Danilo Gligoroski. 389-408 [doi]
- Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on LatticesVeronika Kuchta, Olivier Markowitch. 409-435 [doi]
- One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement with Multiple Private Key GeneratorsAtsushi Fujioka. 436-460 [doi]
- Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial CheckingHerman Galteland, Stig Fr. Mjølsnes, Ruxandra F. Olimid. 463-473 [doi]
- Cryptanalysis of an Identity-Based Convertible Undeniable Signature SchemeRouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng. 474-477 [doi]
- Towards User-Friendly CryptographyGoichiro Hanaoka. 481-484 [doi]
- Multi-prover Interactive Proofs: Unsound FoundationsClaude Crépeau, Nan Yang. 485-493 [doi]
- Human Public-Key EncryptionHouda Ferradi, Rémi Géraud, David Naccache. 494-505 [doi]
- Two Philosophies for Solving Non-linear Equations in Algebraic CryptanalysisNicolas T. Courtois. 506-520 [doi]
- Watermarking Cryptographic ProgramsRyo Nishimaki. 521-543 [doi]
- From Higher-Order Differentials to Polytopic CryptyanalysisTyge Tiessen. 544-552 [doi]
- Division Property: Efficient Method to Estimate Upper Bound of Algebraic DegreeYosuke Todo. 553-571 [doi]