Abstract is missing.
- Efficient Protocol for Authenticated Email SearchSanjit Chatterjee, Sayantan Mukherjee, Govind Patidar. 1-20 [doi]
- Analyzing Traffic Features of Common Standalone DoS Attack ToolsVit Bukac, Vashek Matyas. 21-40 [doi]
- Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design ApproachAvik Dayal, Yi Deng, Sandeep K. Shukla. 41-54 [doi]
- Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies CloserTrent Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Rueda, Joshua Schiffman, Hayawardh Vijayakumar. 55-74 [doi]
- Improving Application Security through TLS-Library RedesignLeo St. Amour, W. Michael Petullo. 75-94 [doi]
- How Not to Combine RC4 StatesSubhadeep Banik, Sonu Jha. 95-112 [doi]
- Preimage Analysis of the Maelstrom-0 Hash FunctionRiham AlTawy, Amr M. Youssef. 113-126 [doi]
- Meet-in-the-Middle Attacks on Round-Reduced KhudraMohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef. 127-138 [doi]
- Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key SettingAhmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef. 139-150 [doi]
- S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side ChannelsClaude Carlet. 151-171 [doi]
- Simulations of Optical Emissions for Attacking AES and Masked AESGuido Marco Bertoni, Lorenzo Grassi, Filippo Melzani. 172-189 [doi]
- Fault Tolerant Infective Countermeasure for AESSikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay. 190-209 [doi]
- Modified Transparency Order Property: Solution or Just Another AttemptStjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Lejla Batina. 210-227 [doi]
- Investigating SRAM PUFs in large CPUs and GPUsPol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen. 228-247 [doi]
- Reconfigurable LUT: A Double Edged Sword for Security-Critical ApplicationsDebapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm. 248-268 [doi]
- Architecture Considerations for Massively Parallel Hardware Security Platform - Building a Workhorse for Cryptography as a ServiceDan Cvrcek, Petr Svenda. 269-288 [doi]
- Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR MicrocontrollersErick Nascimento, Julio López, Ricardo Dahab. 289-309 [doi]
- Towards Practical Attribute-Based SignaturesBrinda Hampiholi, Gergely Alpár, Fabian van den Broek, Bart Jacobs 0001. 310-328 [doi]
- Hierarchical Ring Signatures Revisited - Unconditionally and Perfectly Anonymous Schnorr VersionLukasz Krzywiecki, Malgorzata Sulkowska, Filip Zagórski. 329-346 [doi]
- Compact Accumulator Using LatticesMahabir Prasad Jhanwar, Reihaneh Safavi-Naini. 347-358 [doi]
- Almost Optimum Secret Sharing with Cheating DetectionMahabir Prasad Jhanwar, Reihaneh Safavi-Naini. 359-372 [doi]