Accepted Papers

Title: Ensuring Authentication of Digital Information using Cryptographic Accumulators
Authors: Christophe Tartary
Affiliations: Institute for Theoretical Computer Science - Tsinghua University - Beijing, P. R. China
Title: A Secure Channel Free Public Key Encryption With Keyword Search Scheme Without Random Oracle
Authors: Liming Fang, Willy Susilo, Chunpeng Ge, and Jiandong Wan
Affiliations: Nanjing University of Aeronautics and Astronautics, China and University of Wollongong, Australia
Title: An Analysis of the Compact XSL Attack on BES and Embedded SMS4
Authors: Jiali Choy, Huihui Yap, and Khoongming Khoo
Affiliations: DSO National Laboratories
Title: Short Hash-based Signatures for Wireless Sensor Networks
Authors: Erik Dahmen and Christoph Kraus
Affiliations: Technische Universitat Darmstadt, Fraunhofer-Institute for Secure Information Technology (SIT)
Title: Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity
Authors: Shaojing Fu, Chao Li, Kanta Matsuura, and Longjiang Qu
Affiliations: National University of Defence Technology, China, University of Tokyo, Japan
Title: An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards
Authors: Wen-Ting Jin and Jing Xu
Affiliations: State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences
Title: Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
Authors: Jean-Luc Beuchat, Emmanuel Lopez-Trejo, Luis Martinez-Ramos, Shigeo Mitsunari, and Francisco Rodriguez-Henriquez
Affiliations: University of Tsukuba (Japan), Centro de Investigacion y de Estudios Avanzados del IPN (Mexico), Cybozu Labs (Japan), and Intel - Guadalajara (Mexico)
Title: On the Complexity of Computing Discrete Logarithms over Algebraic Tori
Authors: Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, and Hiroki Shizuya
Affiliations: Graduate School of Information Sciences, Tohoku University
Title: RFID distance bounding protocol with mixed challenges to prevent relay attacks
Authors: Chong Hee Kim and Gildas Avoine
Affiliations: UCL (Universite Catholique de Louvain), Belgium
Title: Improving the Rainbow Attack by Reusing Colours
Authors: Martin Agren, Thomas Johansson, and Martin Hell
Affiliations: Lund University
Title: Saturation Attack on the Block Cipher HIGHT
Authors: Peng Zhang, Bing Sun, and Chao Li
Affiliations: Mathematics and System Science of National University of Defence Technology
Title: Fully Robust Tree-Diffie-Hellman Group Key Exchange
Authors: Mark Manulis, Emmanuel Bresson and Timo Brecher
Affiliations: TU Darmstadt, DCSSI Crypto Lab, and INFODAS
Title: Extensions of the Cube Attack based on Low Degree Annihilators
Authors: Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, and Josef Pieprzyk
Affiliations: DSO National Laboratories School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore. Macquarie University, Australia.
Title: Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Authors: Nitesh Saxena and Md. Borhan Uddin
Affiliations: Polytechnic Institute of New York University
Title: DepenDNS: Dependable Mechanism against DNS Cache Poisoning
Authors: Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, and Yue-Hsun Lin
Affiliations: Department of Computer Science, National Tsing Hua University Sec. 2, Kung-Fu Rd., HsinChu, Taiwan 30013
Title: On Cryptographic Schemes Based on Discrete Logarithms and Factoring
Authors: Marc Joye
Affiliations: Thomson R&D
Title: Private-Key Hidden Vector Encryption with Key Privacy
Authors: Carlo Blundo, Vincenzo Iovino, and Giuseppe Persiano
Affiliations: Dip. Informatica ed Appl., Universita' di Salerno, Salerno, Italy
Title: Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
Authors: Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, and Pandu Rangan C
Affiliations: NIT Trichy, ITBHU,IIT Madras
Title: Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Authors: Jorge Nakahara Jr, Pouyan Sepehrdad, Bingsheng Zhang, and Meiqin Wang
Affiliations: EPFL, Lausanne, Switzerland, University College London, UK, Key Laboratory of Cryptographic Technology and Information Security, Ministry of Education, Shandong University, China
Title: Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
Authors: Benoit Libert and Damien Vergnaud
Affiliations: UCL Crypto Group and Ecole Normale Superieure
Title: Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Authors: Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider
Affiliations: Bell Laboratories, Ruhr University Bochum
Title: Anonymizer-Enabled Security and Privacy for RFID
Authors: Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann
Affiliations: Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Germany and Dipartimento di Informatica ed Applicazioni, University of Salerno, Italy
Title: Transferable Anonymous Constant-Size Fair E-Cash
Authors: Georg Fuchsbauer, David Pointcheval, and Damien Vergnaud
Affiliations: Ecole normale superieure, LIENS - CNRS - INRIA, Paris, France
Title: Side Channel Cube Attack on PRESENT
Authors: Lin Yang, Meiqin Wang and Siyuan Qiao
Affiliations: Shandong University, China.
Title: On the Usability of Secure Association of Wireless Devices Based On Distance Bounding
Authors: Mario Cagalj, Nitesh Saxena, and Ersin Uzun
Affiliations: University of Split, Polytechnic Institute of New York University, UC Irvine
Title: Distinguishing and Second-Preimage Attack on CBC-like MACs
Authors: Keting Jia, Xiaoyun Wang, Zheng Yuan, and Guangwu Xu
Affiliations: Shandong University, China
Title: Relinkable Ring Signature
Authors: Koutarou Suzuki, Fumitaka Hoshino and Tetsutaro Kobayashi
Affiliations: NTT Corporation and IPA
Title: MIBS: A New Lightweight Block Cipher
Authors: Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, and Hossein Arabnezhad Khanooki
Affiliations: Amirkabir University of Technology
Title: Verifying Anonymous Credential Systems in Applied Pi Calculus
Authors: Xiangxi Li, Yu Zhang, and Yuxin Deng
Affiliations: Shanghai Jiatong University, China. Institute of Software, Chinese Academy of Science, China.
Title: Algebraic Attack on the MQQ Public Key Cryptosystem
Authors: Mohamed Saied Emam Mohamed, Fabian Werner, Jintai Ding, and Johannes Buchmann
Affiliations: TU-Darmstadt
Title: Stronger Password Authentication against Cross-Site Impersonation
Authors: Xavier Boyen
Affiliations: Stanford University
Title: Privacy-Preserving Relationship Path Discovery in Social Networks
Authors: Ghita Mezzour, Adrian Perrig, Virgil Gligor, and Panos Papadimitratos
Affiliations: Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Ecole Polytechnique Federale de Lausanne