Abstract is missing.
- Time-Specific EncryptionKenneth G. Paterson, Elizabeth A. Quaglia. 1-16 [doi]
- Public-Key Encryption with Efficient Amortized UpdatesNishanth Chandran, Rafail Ostrovsky, William E. Skeith III. 17-35 [doi]
- Generic Constructions of Parallel Key-Insulated EncryptionGoichiro Hanaoka, Jian Weng. 36-53 [doi]
- Heuristics and Rigor in Lattice-Based Cryptography - (Invited Talk)Chris Peikert. 54 [doi]
- Differential Fault Analysis of LEXJianyong Huang, Willy Susilo, Jennifer Seberry. 55-72 [doi]
- Generalized RC4 Key Collisions and Hash CollisionsJiageng Chen, Atsuko Miyaji. 73-87 [doi]
- On the Indifferentiability of the Grøstl Hash FunctionElena Andreeva, Bart Mennink, Bart Preneel. 88-105 [doi]
- Algorithmic Tamper-Proof Security under Probing AttacksFeng-Hao Liu, Anna Lysyanskaya. 106-120 [doi]
- Leakage-Resilient StorageFrancesco Davì, Stefan Dziembowski, Daniele Venturi. 121-137 [doi]
- Searching Keywords with Wildcards on Encrypted DataSaeed Sedghi, Peter van Liesdonk, Svetla Nikova, Pieter H. Hartel, Willem Jonker. 138-153 [doi]
- Threshold Attribute-Based SigncryptionMartin Gagné, Shivaramakrishnan Narayan, Reihaneh Safavi-Naini. 154-171 [doi]
- Efficiency-Improved Fully Simulatable Adaptive OT under the DDH AssumptionKaoru Kurosawa, Ryo Nojima, Le Trieu Phong. 172-181 [doi]
- Improved Primitives for Secure Multiparty Integer ComputationOctavian Catrina, Sebastiaan de Hoogh. 182-199 [doi]
- How to Pair with a HumanStefan Dziembowski. 200-218 [doi]
- A New Security Model for Authenticated Key AgreementAugustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard. 219-234 [doi]
- A Security Enhancement and Proof for Authentication and Key Agreement (AKA)Vladimir Kolesnikov. 235-252 [doi]
- Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings ModelStanislaw Jarecki, Nitesh Saxena. 253-270 [doi]
- Kleptography from Standard Assumptions and ApplicationsAdam Young, Moti Yung. 271-290 [doi]
- Provably Secure Convertible Undeniable Signatures with UnambiguityLe Trieu Phong, Kaoru Kurosawa, Wakaha Ogata. 291-308 [doi]
- History-Free Aggregate Message Authentication CodesOliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Dominique Schröder, Peter Schröder, Daniel Wagner. 309-328 [doi]
- Recursive Lattice ReductionThomas Plantard, Willy Susilo. 329-344 [doi]
- Adaptively Secure Identity-Based Identification from Lattices without Random OraclesMarkus Rückert. 345-362 [doi]
- The Fiat-Shamir Transform for Group and Ring Signature SchemesMing-Feng Lee, Nigel P. Smart, Bogdan Warinschi. 363-380 [doi]
- Get Shorty via Group Signatures without EncryptionPatrik Bichsel, Jan Camenisch, Gregory Neven, Nigel P. Smart, Bogdan Warinschi. 381-398 [doi]
- Group Message AuthenticationBartosz Przydatek, Douglas Wikström. 399-417 [doi]
- Fast Secure Computation of Set IntersectionStanislaw Jarecki, Xiaomin Liu. 418-435 [doi]
- Distributed Private-Key Generators for Identity-Based CryptographyAniket Kate, Ian Goldberg. 436-453 [doi]
- Solving Revocation with Efficient Update of Anonymous CredentialsJan Camenisch, Markulf Kohlweiss, Claudio Soriente. 454-471 [doi]