Secure Two-Party Computation |
Secure Set Intersection with Untrusted Hardware Tokens / Marc Fischlin ; Benny Pinkas ; Ahmad-Reza Sadeghi ; Thomas Schneider ; Ivan Visconti |
Efficient Secure Two-Party Exponentiation / Ching-Hua Yu ; Sherman S.M. Chow ; Kai-Min Chung ; Feng-Hao Liu |
Cryptographic Primitives |
A General, Flexible and Efficient Proof of Inclusion and Exclusion / Kun Peng |
Non-interactive Confirmer Signatures / Kristiyan Haralambiev |
Communication-Efficient 2-Round Group Key Establishment from Pairings / Kashi Neupane ; Rainer Steinwandt |
Side Channel Attacks |
Defeating RSA Multiply-Always and Message Blinding Countermeasures / Marc F. Witteman ; Jasper G.J. van Woudenberg ; Federico Menarini |
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns / Chester Rebeiro ; Debdeep Mukhopadhyay |
Improving Differential Power Analysis by Elastic Alignment / Bram Bakker |
Invited Talk |
NSA's Role in the Development of DES / Richard M. George |
Authenticated Key Agreement |
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys / Atsushi Fujioka ; Koutarou Suzuki |
Contributory Password-Authenticated Group Key Exchange with Join Capability / Michel Abdalla ; Céline Chevalier ; Louis Granboulan ; David Pointcheval |
Proofs of Security |
Ideal Key Derivation and Encryption in Simulation-Based Security / Ralf Küsters ; Max Tuengerthal |
Beyond Provable Security Verifiable IND-CCA Security of OAEP / Gilles Barthe ; Benjamin Grégoire ; Yassine Lakhnech ; Santiago Zanella Béguelin |
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach / Lei Wang ; Yu Sasaki ; Wataru Komatsubara ; Kazuo Ohta ; Kazuo Sakiyama |
MJH: A Faster Alternative to MDC-2 / Jooyung Lee ; Martijn Stam |
Block Ciphers |
Online Ciphers from Tweakable Blockciphers / Phillip Rogaway ; Haibin Zhang |
Meet-in-the-Middle Attacks on Reduced-Round XTEA / Gautham Sekar ; Nicky Mouha ; Vesselin Velichkov ; Bart Preneel |
Security Notions |
Expedient Non- malleability Notions for Hash Functions / Paul Baecher ; Dominique Schröder |
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols / Douglas Stebila ; Lakshmi Kuppusamy ; Jothi Rangasamy ; Colin Boyd ; Juan Gonzalez Nieto |
Public-Key Encryption |
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes / Joonsang Baek ; Cheng-Kang Chu ; Jianying Zhou |
Better Key Sizes (and Attacks) for LWE-Based Encryption / Richard Lindner ; Chris Peikert |
Crypto Tools and Parameters |
Binary Huff Curves / Julien Devigne ; Marc Joye |
A Variant of the F4 Algorithm / Antoine Joux ; Vanessa Vitse |
Attribute-Based Signatures / Hemanta K. Maji ; Manoj Prabhakaran ; Mike Rosulek |
Digital Signatures |
Sub-linear Size Traceable Ring Signatures without Random Oracles / Eiichiro Fujisaki |
Author Index |
Secure Two-Party Computation |
Secure Set Intersection with Untrusted Hardware Tokens / Marc Fischlin ; Benny Pinkas ; Ahmad-Reza Sadeghi ; Thomas Schneider ; Ivan Visconti |
Efficient Secure Two-Party Exponentiation / Ching-Hua Yu ; Sherman S.M. Chow ; Kai-Min Chung ; Feng-Hao Liu |