Abstract is missing.
- Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based SignaturesDan Boneh, David Mandell Freeman. 1-16 [doi]
- Homomorphic Network Coding Signatures in the Standard ModelNuttapong Attrapadung, Benoît Libert. 17-34 [doi]
- Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard ModelTatsuaki Okamoto, Katsuyuki Takashima. 35-52 [doi]
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure RealizationBrent Waters. 53-70 [doi]
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based EncryptionShota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro. 71-89 [doi]
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size CiphertextsNuttapong Attrapadung, Benoît Libert, Elie de Panafieu. 90-108 [doi]
- Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic ThreeRoberto Maria Avanzi, Clemens Heuberger. 109-127 [doi]
- On the Correct Use of the Negation Map in the Pollard rho MethodDaniel J. Bernstein, Tanja Lange, Peter Schwabe. 128-146 [doi]
- Cryptanalysis of the RSA Subgroup Assumption from TCC 2005Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi. 147-155 [doi]
- (If) Size Matters: Size-Hiding Private Set IntersectionGiuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik. 156-173 [doi]
- Sub-linear, Secure Comparison with Two Non-colluding PartiesTomas Toft. 174-191 [doi]
- Oblivious Transfer with Hidden Access Control PoliciesJan Camenisch, Maria Dubovitskaya, Gregory Neven, Gregory M. Zaverucha. 192-209 [doi]
- Chosen Ciphertext Secure Encryption under Factoring Assumption RevisitedQixiang Mei, Bao Li, Xianhui Lu, Dingding Jia. 210-227 [doi]
- Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext SecurityJunzuo Lai, Robert H. Deng, Shengli Liu. 228-245 [doi]
- Parallel Decryption Queries in Bounded Chosen Ciphertext AttacksTakahiro Matsuda 0002, Kanta Matsuura. 246-264 [doi]
- Secure Blind DecryptionMatthew Green. 265-282 [doi]
- New Developments in Leakage-Resilient CryptographyVinod Vaikuntanathan. 283 [doi]
- On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010Jian Weng, Yunlei Zhao, Goichiro Hanaoka. 284-295 [doi]
- Fully Secure Accountable-Authority Identity-Based EncryptionAmit Sahai, Hakan Seyalioglu. 296-316 [doi]
- One-Pass HMQV and Asymmetric Key-WrappingShai Halevi, Hugo Krawczyk. 317-334 [doi]
- Linear Recurring Sequences for the UOV Key GenerationAlbrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann. 335-350 [doi]
- On the Impossibility of Instantiating PSS in the Standard ModelRishiraj Bhattacharyya, Avradip Mandal. 351-368 [doi]
- On-line Non-transferable Signatures RevisitedJacob C. N. Schuldt, Kanta Matsuura. 369-386 [doi]
- Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear AlgebraJae Hong Seo. 387-402 [doi]
- Signatures on Randomizable CiphertextsOlivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud. 403-422 [doi]
- Revocation for Delegatable Anonymous CredentialsTolga Acar, Lan Nguyen. 423-440 [doi]
- Cryptanalysis of Multivariate and Odd-Characteristic HFE VariantsLuk Bettale, Jean-Charles Faugère, Ludovic Perret. 441-458 [doi]
- Cryptanalysis of Cryptosystems Based on Non-commutative Skew PolynomialsVivien Dubois, Jean-Gabriel Kammerer. 459-472 [doi]
- Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret ProblemCharles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret. 473-493 [doi]