Abstract is missing.
- Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313Gautham Sekar, Bart Preneel. 1-12 [doi]
- Generalized Security Analysis of the Random Key Bits Leakage AttackJun Kogure, Noboru Kunihiro, Hirosuke Yamamoto. 13-27 [doi]
- Improved Integral Attacks on Reduced-Round CLEFIA Block CipherYanjun Li, Wenling Wu, Lei Zhang 0012. 28-39 [doi]
- Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-ForwardChiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama. 40-54 [doi]
- Known-Key Distinguisher on Round-Reduced 3D Block CipherLe Dong, Wenling Wu, Shuang Wu, Jian Zou. 55-69 [doi]
- Identity-Based Signcryption from Identity-Based CryptographyWoomyo Lee, Jae Woo Seo, Pil Joong Lee. 70-83 [doi]
- Order-Preserving Encryption for Non-uniformly Distributed PlaintextsDae Hyun Yum, Duk Soo Kim, Jin Seok Kim, Pil Joong Lee, Sung Je Hong. 84-97 [doi]
- Solving a DLP with Auxiliary Input with the ρ-AlgorithmYumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda. 98-108 [doi]
- A General NTRU-Like Framework for Constructing Lattice-Based Public-Key CryptosystemsYanbin Pan, Yingpu Deng. 109-120 [doi]
- A Peer-to-Peer Content-Distribution Scheme Resilient to Key LeakageTatsuyuki Matsushita, Shinji Yamanaka, Fangming Zhao. 121-135 [doi]
- Rule Indexing for Efficient Intrusion Detection SystemsBoojoong Kang, Hye Seon Kim, Ji Su Yang, Eul-Gyu Im. 136-141 [doi]
- Security Data Extraction from IEC 61850 ACSI Models for Network and System ManagementChung-Hyo Kim, Moon-Seok Choi, Seongho Ju, Yong Hun Lim, Jong-mock Baek. 142-150 [doi]
- Lightweight Middleware-Based ZigBee Security in Building Energy Management SystemInsung Hong, Jinsung Byun, Sehyun Park. 151-156 [doi]
- A Map-Layer-Based Access Control ModelYingjun Zhang, Yang Zhang, Kai Chen. 157-170 [doi]
- Application Authentication for Hybrid Services of Broadcasting and Communications NetworksGo Ohtake, Kazuto Ogawa. 171-186 [doi]
- Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing ProtocolsNaoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura. 187-202 [doi]
- Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor NetworksKwantae Cho, Dong-Hoon Lee. 203-218 [doi]
- Mutual Private Set Intersection with Linear ComplexityMyungsun Kim, Hyung Tae Lee, Jung Hee Cheon. 219-231 [doi]
- Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNsChung Il Sun, Tae Ho Cho. 232-241 [doi]
- Evaluating the Security and Privacy of Near Field Communication - Case: Public TransportationJarno Salonen. 242-255 [doi]
- Exploiting Routing Tree Construction in CTPIslam Hegazy, Reihaneh Safavi-Naini, Carey Williamson. 256-270 [doi]