Abstract is missing.
- Storage Encryption: A Cryptographer s ViewShai Halevi. 1 [doi]
- Implementing Two-Party Computation Efficiently with Security Against Malicious AdversariesYehuda Lindell, Benny Pinkas, Nigel P. Smart. 2-20 [doi]
- CLL: A Cryptographic Link Layer for Local Area NetworksYves Igor Jerschow, Christian Lochert, Björn Scheuermann, Martin Mauve. 21-38 [doi]
- Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature VerificationBodo Möller, Andy Rupp. 39-56 [doi]
- Privacy Preserving Data Mining within Anonymous Credential SystemsAggelos Kiayias, Shouhuai Xu, Moti Yung. 57-76 [doi]
- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable FunctionJulien Bringer, Hervé Chabanne, Thomas Icart. 77-91 [doi]
- Two Generic Constructions of Probabilistic Cryptosystems and Their ApplicationsGuilhem Castagnos. 92-108 [doi]
- Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker AssumptionIsamu Teranishi, Wakaha Ogata. 109-125 [doi]
- General Certificateless Encryption and Timed-Release EncryptionSherman S. M. Chow, Volker Roth, Eleanor G. Rieffel. 126-143 [doi]
- Efficient Certificate-Based Encryption in the Standard ModelJoseph K. Liu, Jianying Zhou. 144-155 [doi]
- An Improved Robust Fuzzy ExtractorBhavana Kanukurthi, Leonid Reyzin. 156-171 [doi]
- On Linear Secret Sharing for Connectivity in Directed GraphsAmos Beimel, Anat Paskin. 172-184 [doi]
- Expressive Subgroup SignaturesXavier Boyen, Cécile Delerablée. 185-200 [doi]
- Anonymous Proxy SignaturesGeorg Fuchsbauer, David Pointcheval. 201-217 [doi]
- Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman ProblemAli Bagherzandi, Stanislaw Jarecki. 218-235 [doi]
- Using Normal Bases for Compact Hardware Implementations of the AES S-BoxSvetla Nikova, Vincent Rijmen, Martin Schläffer. 236-245 [doi]
- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC CodesMarco Baldi, Marco Bodrato, Franco Chiaraluce. 246-262 [doi]
- Full Cryptanalysis of LPS and Morgenstern Hash FunctionsChristophe Petit, Kristin Lauter, Jean-Jacques Quisquater. 263-277 [doi]
- A New DPA Countermeasure Based on Permutation TablesJean-Sébastien Coron. 278-292 [doi]
- Simplified Submission of Inputs to ProtocolsDouglas Wikström. 293-308 [doi]
- Unconditionally Reliable and Secure Message Transmission in Directed Networks RevisitedArpita Patra, Ashish Choudhary, C. Pandu Rangan. 309-326 [doi]
- Linear Bandwidth Naccache-Stern EncryptionBenoît Chevallier-Mames, David Naccache, Jacques Stern. 327-339 [doi]
- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security TreatmentKenneth G. Paterson, Gaven J. Watson. 340-357 [doi]
- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou. 358-374 [doi]
- New Anonymity Notions for Identity-Based EncryptionMalika Izabachène, David Pointcheval. 375-391 [doi]
- A Universally Composable Group Key Exchange Protocol with Minimum Communication EffortJun Furukawa, Frederik Armknecht, Kaoru Kurosawa. 392-408 [doi]
- An Identity-Based Key Agreement Protocol for the Network LayerChristian Schridde, Matthew Smith, Bernd Freisleben. 409-422 [doi]