Abstract is missing.
- The Realm of the PairingsDiego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini. 3-25 [doi]
- A Three-Level Sieve Algorithm for the Shortest Vector ProblemFeng Zhang, Yanbin Pan, Gengran Hu. 29-47 [doi]
- Improvement and Efficient Implementation of a Lattice-Based Signature SchemeRachid El Bansarkhani, Johannes Buchmann. 48-67 [doi]
- Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable HardwareThomas Pöppelmann, Tim Güneysu. 68-85 [doi]
- Practical Approaches to Varying Network Size in Combinatorial Key Predistribution SchemesKevin J. Henry, Maura B. Paterson, Douglas R. Stinson. 89-117 [doi]
- A Group Action on $${\mathbb Z}_p^{\times }$$ and the Generalized DLP with Auxiliary InputsJung Hee Cheon, Taechan Kim, Yong-Soo Song. 121-135 [doi]
- Solving a 6120 -bit DLP on a Desktop ComputerFaruk Göloglu, Robert Granger, Gary McGuire, Jens Zumbrägel. 136-152 [doi]
- How to Recover Any Byte of Plaintext on RC4Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii. 155-173 [doi]
- The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALEDmitry Khovratovich, Christian Rechberger. 174-184 [doi]
- AEGIS: A Fast Authenticated Encryption AlgorithmHongjun Wu, Bart Preneel. 185-201 [doi]
- Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAsCharles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang. 205-222 [doi]
- Faster Hash-Based Signatures with Bounded LeakageThomas Eisenbarth, Ingo von Maurich, Xin Ye. 223-243 [doi]
- White-Box Security Notions for Symmetric Encryption SchemesCécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain. 247-264 [doi]
- Two Attacks on a White-Box AES ImplementationTancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel. 265-285 [doi]
- Extended Generalized Feistel Networks Using Matrix RepresentationThierry P. Berger, Marine Minier, Gaël Thomas 0002. 289-305 [doi]
- Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIAAndrey Bogdanov, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard. 306-323 [doi]
- Implementing Lightweight Block Ciphers on x86 ArchitecturesRyad Benadjila, Jian Guo 0001, Victor Lomné, Thomas Peyrin. 324-351 [doi]
- A New Index Calculus Algorithm with Complexity $$L(1/4+o(1))$$ in Small CharacteristicAntoine Joux. 355-379 [doi]
- High Precision Discrete Gaussian Sampling on FPGAsSujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede. 383-401 [doi]
- Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the IntegersJohannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden. 402-417 [doi]
- A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm pYuan Ma, Zongbin Liu, Wuqiong Pan, Jiwu Jing. 421-437 [doi]
- Exponentiating in Pairing GroupsJoppe W. Bos, Craig Costello, Michael Naehrig. 438-455 [doi]
- Faster Repeated Doublings on Binary Elliptic CurvesChristophe Doche, Daniel Sutantyo. 456-470 [doi]
- Montgomery Multiplication Using Vector InstructionsJoppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha. 471-489 [doi]
- Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5Yu Sasaki, Lei Wang. 493-512 [doi]
- Provable Second Preimage Resistance RevisitedCharles Bouillaguet, Bastien Vayssière. 513-532 [doi]
- Multiple Limited-Birthday Distinguishers and ApplicationsJérémy Jean, María Naya-Plasencia, Thomas Peyrin. 533-550 [doi]
- Horizontal Collision Correlation Attack on Elliptic CurvesAurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild. 553-570 [doi]
- When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in PracticeDavid Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, Christof Paar. 571-588 [doi]