|
|
|
Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE |
|
|
1 | (16) |
|
|
|
Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1 |
|
|
17 | (17) |
|
|
|
|
Some Insights into Differential Cryptanalysis of Grain v1 |
|
|
34 | (16) |
|
|
On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations |
|
|
50 | (16) |
|
|
|
|
|
|
Strongly Simulation-Extractable Leakage-Resilient NIZK |
|
|
66 | (16) |
|
|
|
A Secure Three-Party Computational Protocol for Triangle Area |
|
|
82 | (16) |
|
|
|
|
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption |
|
|
98 | (17) |
|
|
|
|
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage |
|
|
115 | (16) |
|
|
|
|
|
|
|
|
Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets |
|
|
131 | (17) |
|
|
|
|
|
A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012 |
|
|
148 | (14) |
|
|
|
Further Research on N-1 Attack against Exponentiation Algorithms |
|
|
162 | (14) |
|
|
|
|
|
|
Cryptanalysis of RSA with Multiple Small Secret Exponents |
|
|
176 | (16) |
|
|
|
Fine-grain Cryptographic Protocols |
|
|
|
New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation |
|
|
192 | (17) |
|
|
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model |
|
|
209 | (17) |
|
|
|
Incrementally Executable Signcryptions |
|
|
226 | (16) |
|
|
|
|
Hierarchical Identity-Based Broadcast Encryption |
|
|
242 | (16) |
|
|
|
|
|
|
|
Continuous After-the-Fact Leakage-Resilient Key Exchange |
|
|
258 | (16) |
|
|
|
|
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited |
|
|
274 | (16) |
|
|
|
|
|
|
On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption |
|
|
290 | (16) |
|
|
|
|
|
ELmE : A Misuse Resistant Parallel Authenticated Encryption |
|
|
306 | (16) |
|
|
|
Lattices and Homomorphic Encryption |
|
|
|
Lattice Decoding Attacks on Binary LWE |
|
|
322 | (16) |
|
|
|
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption |
|
|
338 | (16) |
|
|
|
|
|
|
|
|
Once Root Always a Threat: Analyzing the Security Threats of Android Permission System |
|
|
354 | (16) |
|
|
|
|
|
|
A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission |
|
|
370 | (16) |
|
|
|
|
|
|
Another Look at Privacy Threats in 3G Mobile Telephony |
|
|
386 | (11) |
|
Mohammed Shafiul Alam Khan |
|
|
|
ExBLACR: Extending BLACR System |
|
|
397 | (16) |
|
|
|
|
|
|
|
|
|
A Semantics-Aware Classification Approach for Data Leakage Prevention |
|
|
413 | (9) |
|
|
|
Vallipuram Muthukkumarasamy |
|
|
Route 66: Passively Breaking All GSM Channels |
|
|
422 | (8) |
|
|
|
An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones |
|
|
430 | (8) |
|
Yogachandran Rahulamathavan |
|
|
|
|
|
|
Running Multiple Androids on One ARM Platform |
|
|
438 | (8) |
|
|
|
|
|
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android |
|
|
446 | (8) |
|
|
|
|
|
|
|
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2 |
|
|
454 | (9) |
|
|
Author Index |
|
463 | |