Abstract is missing.
- Better Bootstrapping in Fully Homomorphic EncryptionCraig Gentry, Shai Halevi, Nigel P. Smart. 1-16 [doi]
- Polly Cracker, Revisited, RevisitedGottfried Herold. 17-33 [doi]
- Ring-LWE in Polynomial RingsLéo Ducas, Alain Durmus. 34-51 [doi]
- On Homomorphic Encryption and Chosen-Ciphertext SecurityBrett Hemenway, Rafail Ostrovsky. 52-65 [doi]
- Waters Signatures with Optimal Security ReductionDennis Hofheinz, Tibor Jager, Edward Knapp. 66-83 [doi]
- Strong Security from Probabilistic Signature SchemesSven Schäge. 84-101 [doi]
- Space Efficient Signature Schemes from the RSA AssumptionShota Yamada, Goichiro Hanaoka, Noboru Kunihiro. 102-119 [doi]
- The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random OraclesQiong Huang, Duncan S. Wong, Willy Susilo. 120-137 [doi]
- Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava CodesPierre-Louis Cayrel, Gerhard Hoffmann, Edoardo Persichetti. 138-155 [doi]
- Solving Underdetermined Systems of Multivariate Quadratic Equations RevisitedEnrico Thomae, Christopher Wolf. 156-171 [doi]
- Public-Key Identification Schemes Based on Multivariate Cubic PolynomialsKoichi Sakumoto. 172-189 [doi]
- Public-Key Cryptography from New Multivariate Quadratic AssumptionsYun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang. 190-205 [doi]
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard ModelBenoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia. 206-224 [doi]
- Outsider-Anonymous Broadcast Encryption with Sublinear CiphertextsNelly Fazio, Irippuge Milinda Perera. 225-242 [doi]
- Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate AuthenticationShota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro. 243-261 [doi]
- Public Key Encryption against Related Key AttacksHoeteck Wee. 262-279 [doi]
- Functional Encryption for Threshold Functions (or Fuzzy IBE) from LatticesShweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee. 280-297 [doi]
- Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract)Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar. 298-315 [doi]
- From Selective to Full Security: Semi-generic Transformations in the Standard ModelMichel Abdalla, Dario Fiore, Vadim Lyubashevsky. 316-333 [doi]
- Circular and KDM Security for Identity-Based EncryptionJacob Alperin-Sheriff, Chris Peikert. 334-352 [doi]
- NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard ModelRon Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, Huaxiong Wang. 353-371 [doi]
- Generating Provable Primes Efficiently on Embedded DevicesChristophe Clavier, Benoit Feix, Loïc Thierry, Pascal Paillier. 372-389 [doi]
- Password-Based Authenticated Key ExchangeDavid Pointcheval. 390-397 [doi]
- Constant-Round Multi-party Private Set Union Using Reversed Laurent SeriesJae Hong Seo, Jung Hee Cheon, Jonathan Katz. 398-412 [doi]
- Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy PoliciesEmil Stefanov, Elaine Shi, Dawn Song. 413-430 [doi]
- Efficiently Shuffling in PublicUdaya Parampalli, Kim Ramchen, Vanessa Teague. 431-448 [doi]
- Efficient Password Authenticated Key Exchange via Oblivious TransferRan Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan, Hoeteck Wee. 449-466 [doi]
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and LatticesAtsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama. 467-484 [doi]
- Relatively-Sound NIZKs and Password-Based Key-ExchangeCharanjit S. Jutla, Arnab Roy. 485-503 [doi]
- Multi-location Leakage Resilient CryptographyAli Juma, Yevgeniy Vahlis, Moti Yung. 504-521 [doi]
- On Definitions of Selective Opening SecurityFlorian Böhl, Dennis Hofheinz, Daniel Kraschewski. 522-539 [doi]
- New Definitions and Separations for Circular SecurityDavid Cash, Matthew Green 0001, Susan Hohenberger. 540-557 [doi]
- Correlated Product Security from Any One-Way FunctionBrett Hemenway, Steve Lu, Rafail Ostrovsky. 558-575 [doi]
- Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation MechanismsTakahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura. 576-594 [doi]
- Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic CurveYumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda. 595-608 [doi]
- Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's MethodsAurélie Bauer, Damien Vergnaud, Jean-Christophe Zapalowicz. 609-626 [doi]
- Extended-DDH and Lossy Trapdoor FunctionsBrett Hemenway, Rafail Ostrovsky. 627-643 [doi]
- DDH-Like Assumptions Based on Extension RingsRonald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel. 644-661 [doi]
- Security of Blind Signatures RevisitedDominique Schröder, Dominique Unruh. 662-679 [doi]
- Efficient Network Coding Signatures in the Standard ModelDario Catalano, Dario Fiore, Bogdan Warinschi. 680-696 [doi]
- Improved Security for Linearly Homomorphic Signatures: A Generic FrameworkDavid Mandell Freeman. 697-714 [doi]
- On the Security of Dynamic Group Signatures: Preventing Signature HijackingYusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta. 715-732 [doi]