Ⅰ Public Key and Elliptic Curve Cryptography
Attacking Code/Lattice-based Cryptosystems Using Partial Knowledge Robert Niebuhr, Pierre-Louis Cayrel, Stanislav Bulygin, Johannes Bachmann
Multivariate Quadratic Quasigroups (MQQs): Construction, Bounds and Complexity
Yanling Chen, Svein Johan Knapskog, Danilo Gligoroski
How to Hash into Twisted Edwards Form Elliptic Curves
Wei Yu, KunPeng Wang
Fast Algorithm Converting Integer to Double Base Chain
Wei Yu, KunPeng Wang, Bao Li
Ⅱ Cryptographic Construction
Visualizing Key Authenticity: Turning Your Face into Your Public Key..
Joan Arnedo-Moreno, Agata Lapedriza
Practical Multi-signature Scheme in the Plain Public Key Model with Tight Security
Changshe Ma
Security Improvement of a Pixel Bit Based Image Scrambling
Encryption Scheme Through the Self-correlation Method
Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai
Hierarchical Attributes: Practical Extension for Attribute-based Encryption
Song Luo, Jianbin Hu, Zhong Chen
A Modular Proof Technique for Password-based Authenticated Key Exchange Protocols
Libin Wang, Jiaxin Pan, Changshe Ma
Cryptographic Hash Functions: Recent Design Trends and Security Notions
Sail Al-Kuwari, James H. Davenport, Russell J. Bradford
Ⅲ System Security
Three-party Password Authenticated Key Exchange in the Standard Model
Xuexian Hu, Zhenfeng Zhang, Wenfen Liu
Ticket Based Pre-authentication Method for Trusted Nodes in Proxy Mobile IPv6 Domain
Ling Tie, Di He
Software Protection Combined with Hardware
Kazuhide Fukushima, Kiyomoto Shinsaku, Toshiaki Tanaka
Author Index