Abstract is missing.
- On Modeling Terrorist Frauds - Addressing Collusion in Distance Bounding ProtocolsSerge Vaudenay. 1-20 [doi]
- Authenticated Key Exchange Protocols Based on Factoring AssumptionHai Huang. 21-37 [doi]
- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single RoundS. Sree Vivek, S. Sharmila Deva Selvi, Layamrudhaa Renganathan Venkatesan, C. Pandu Rangan. 38-58 [doi]
- CIL Security Proof for a Password-Based Key ExchangeCristian Ene, Clémentine Gritti, Yassine Lakhnech. 59-85 [doi]
- Non Observability in the Random Oracle ModelPrabhanjan Ananth, Raghav Bhaskar. 86-103 [doi]
- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete PictureAngsuman Das, Sabyasachi Dutta, Avishek Adhikari. 104-120 [doi]
- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic ExchangesIoana Boureanu, Serge Vaudenay. 121-138 [doi]
- Towards Anonymous Ciphertext Indistinguishability with Identity LeakageTsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu. 139-153 [doi]
- k-time Proxy Signature: Formal Definition and Efficient ConstructionWeiwei Liu, Guomin Yang, Yi Mu, Jiannan Wei. 154-164 [doi]
- Anonymous Signcryption against Linear Related-Key AttacksHui Cui, Yi Mu, Man Ho Au. 165-183 [doi]
- Improved Authenticity Bound of EAX, and RefinementsKazuhiko Minematsu, Stefan Lucks, Tetsu Iwata. 184-201 [doi]
- The Security of the OCB Mode of Operation without the SPRP AssumptionKazumaro Aoki, Kan Yasuda. 202-220 [doi]
- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher ModesKazuhiko Minematsu. 221-238 [doi]
- How to Remove the Exponent GCD in HK09Xianhui Lu, Bao Li, Yamin Liu. 239-248 [doi]
- Translation-Randomizable Distributions via Random WalksNirattaya Khamsemanan, William E. Skeith III. 249-270 [doi]
- RKA Secure PKE Based on the DDH and HR AssumptionsDingding Jia, Xianhui Lu, Bao Li, Qixiang Mei. 271-287 [doi]
- Computationally Efficient Dual-Policy Attribute Based Encryption with Short CiphertextY. Sreenivasa Rao, Ratna Dutta. 288-308 [doi]
- Factoring-Based Proxy Re-Encryption SchemesToshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka. 309-329 [doi]
- Towards a Secure Certificateless Proxy Re-Encryption SchemeHui Guo, Zhenfeng Zhang, Jiang Zhang, Cheng Chen. 330-346 [doi]