| Title: | 
			Ensuring Authentication of Digital Information using Cryptographic Accumulators | 
			
			
			| Authors: | 
			Christophe Tartary | 
			
			
			| Affiliations: | 
			Institute for Theoretical Computer Science - Tsinghua University - Beijing, P. R. China | 
			
			
			
			| Title: | 
			A Secure Channel Free Public Key Encryption With Keyword Search Scheme Without Random Oracle | 
			
			
			| Authors: | 
			Liming Fang, Willy Susilo, Chunpeng Ge, and Jiandong Wan | 
			
			
			| Affiliations: | 
			Nanjing University of Aeronautics and Astronautics, China and University of Wollongong, Australia | 
			
			
			
			| Title: | 
			An Analysis of the Compact XSL Attack on BES and Embedded SMS4 | 
			
			
			| Authors: | 
			Jiali Choy, Huihui Yap, and Khoongming Khoo | 
			
			
			| Affiliations: | 
			DSO National Laboratories | 
			
			
			| Title: | 
			Short Hash-based Signatures for Wireless Sensor Networks | 
			
			
			| Authors: | 
			Erik Dahmen and Christoph Kraus | 
			
			
			| Affiliations: | 
			Technische Universitat Darmstadt, Fraunhofer-Institute for Secure Information Technology (SIT) | 
			
			
			
			| Title: | 
			Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity | 
			
			
			| Authors: | 
			Shaojing Fu, Chao Li, Kanta Matsuura, and Longjiang Qu | 
			
			
			| Affiliations: | 
			National University of Defence Technology, China,  University of Tokyo, Japan | 
			
			
			
			| Title: | 
			An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards | 
			
			
			| Authors: | 
			Wen-Ting Jin and Jing Xu | 
			
			
			| Affiliations: | 
			State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences | 
			
			
			
			| Title: | 
			Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves | 
			
			
			| Authors: | 
			Jean-Luc Beuchat, Emmanuel Lopez-Trejo, Luis Martinez-Ramos, Shigeo Mitsunari, and Francisco Rodriguez-Henriquez | 
			
			
			| Affiliations: | 
			University of Tsukuba (Japan), Centro de Investigacion y de Estudios Avanzados del IPN (Mexico), Cybozu Labs (Japan), and Intel - Guadalajara (Mexico) | 
			
			
			
			| Title: | 
			On the Complexity of Computing Discrete Logarithms over Algebraic Tori | 
			
			
			| Authors: | 
			Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, and Hiroki Shizuya | 
			
			
			| Affiliations: | 
			Graduate School of Information Sciences, Tohoku University | 
			
			
			
			| Title: | 
			RFID distance bounding protocol with mixed challenges to prevent relay attacks | 
			
			
			| Authors: | 
			Chong Hee Kim and Gildas Avoine | 
			
			
			| Affiliations: | 
			UCL (Universite Catholique de Louvain), Belgium | 
			
			
			
			| Title: | 
			Improving the Rainbow Attack by Reusing Colours | 
			
			
			| Authors: | 
			Martin Agren, Thomas Johansson, and Martin Hell | 
			
			
			| Affiliations: | 
			Lund University | 
			
			
			
			| Title: | 
			Saturation Attack on the Block Cipher HIGHT | 
			
			
			| Authors: | 
			Peng Zhang, Bing Sun, and Chao Li | 
			
			
			| Affiliations: | 
			Mathematics and System Science of National University of Defence Technology | 
			
			
			
			| Title: | 
			Fully Robust Tree-Diffie-Hellman Group Key Exchange | 
			
			
			| Authors: | 
			Mark Manulis, Emmanuel Bresson and Timo Brecher | 
			
			
			| Affiliations: | 
			TU Darmstadt, DCSSI Crypto Lab, and INFODAS | 
			
			
			
			| Title: | 
			Extensions of the Cube Attack based on Low Degree Annihilators | 
			
			
			| Authors: | 
			Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, and Josef Pieprzyk | 
			
			
			| Affiliations: | 
			DSO National Laboratories School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore. Macquarie University, Australia. | 
			
			
			
			| Title: | 
			Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes | 
			
			
			| Authors: | 
			Nitesh Saxena and Md. Borhan Uddin | 
			
			
			| Affiliations: | 
			Polytechnic Institute of New York University | 
			
			
			
			| Title: | 
			DepenDNS: Dependable Mechanism against DNS Cache Poisoning | 
			
			
			| Authors: | 
			Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, and Yue-Hsun Lin | 
			
			
			| Affiliations: | 
			Department of Computer Science, National Tsing Hua University Sec. 2, Kung-Fu Rd., HsinChu, Taiwan 30013 | 
			
			
			
			| Title: | 
			On Cryptographic Schemes Based on Discrete Logarithms and Factoring | 
			
			
			| Authors: | 
			Marc Joye | 
			
			
			| Affiliations: | 
			Thomson R&D | 
			
			
			
			| Title: | 
			Private-Key Hidden Vector Encryption with Key Privacy | 
			
			
			| Authors: | 
			Carlo Blundo, Vincenzo Iovino, and Giuseppe Persiano | 
			
			
			| Affiliations: | 
			Dip. Informatica ed Appl., Universita' di Salerno, Salerno, Italy | 
			
			
			
			| Title: | 
			Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security | 
			
			
			| Authors: | 
			Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, and Pandu Rangan C | 
			
			
			| Affiliations: | 
			NIT Trichy, ITBHU,IIT Madras | 
			
			
			
			| Title: | 
			Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT | 
			
			
			| Authors: | 
			Jorge Nakahara Jr, Pouyan Sepehrdad, Bingsheng Zhang, and Meiqin Wang | 
			
			
			| Affiliations: | 
			EPFL, Lausanne, Switzerland, University College London, UK, Key Laboratory of Cryptographic Technology and Information Security, Ministry of Education, Shandong University, China | 
			
			
			
			| Title: | 
			Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model | 
			
			
			| Authors: | 
			Benoit Libert and Damien Vergnaud | 
			
			
			| Affiliations: | 
			UCL Crypto Group and Ecole Normale Superieure | 
			
			
			
			| Title: | 
			Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima | 
			
			
			| Authors: | 
			Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider | 
			
			
			| Affiliations: | 
			Bell Laboratories, Ruhr University Bochum | 
			
			
			
			| Title: | 
			Anonymizer-Enabled Security and Privacy for RFID | 
			
			
			| Authors: | 
			Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann | 
			
			
			| Affiliations: | 
			Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Germany and Dipartimento di Informatica ed Applicazioni, University of Salerno, Italy | 
			
			
			
			| Title: | 
			Transferable Anonymous Constant-Size Fair E-Cash | 
			
			
			| Authors: | 
			Georg Fuchsbauer, David Pointcheval, and Damien Vergnaud | 
			
			
			| Affiliations: | 
			Ecole normale superieure, LIENS - CNRS - INRIA, Paris, France | 
			
			
			
			| Title: | 
			Side Channel Cube Attack on PRESENT | 
			
			
			| Authors: | 
			Lin Yang, Meiqin Wang and Siyuan Qiao | 
			
			
			| Affiliations: | 
			Shandong University, China. | 
			
			
			
			| Title: | 
			On the Usability of Secure Association of Wireless Devices Based On Distance Bounding | 
			
			
			| Authors: | 
			Mario Cagalj, Nitesh Saxena, and Ersin Uzun | 
			
			
			| Affiliations: | 
			University of Split, Polytechnic Institute of New York University, UC Irvine | 
			
			
			
			| Title: | 
			Distinguishing and Second-Preimage Attack on CBC-like MACs | 
			
			
			| Authors: | 
			Keting Jia, Xiaoyun Wang, Zheng Yuan, and Guangwu Xu | 
			
			
			| Affiliations: | 
			Shandong University, China | 
			
			
			| Title: | 
			Relinkable Ring Signature | 
			
			
			| Authors: | 
			Koutarou Suzuki, Fumitaka Hoshino and Tetsutaro Kobayashi | 
			
			
			| Affiliations: | 
			NTT Corporation and IPA | 
			
			
			
			| Title: | 
			MIBS: A New Lightweight Block Cipher | 
			
			
			| Authors: | 
			Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, and Hossein Arabnezhad Khanooki | 
			
			
			| Affiliations: | 
			Amirkabir University of Technology | 
			
			
			
			| Title: | 
			Verifying Anonymous Credential Systems in Applied Pi Calculus | 
			
			
			| Authors: | 
			Xiangxi Li, Yu Zhang, and Yuxin Deng | 
			
			
			| Affiliations: | 
			Shanghai Jiatong University, China. Institute of Software, Chinese Academy of Science, China. | 
			
			
			
			| Title: | 
			Algebraic Attack on the MQQ Public Key Cryptosystem | 
			
			
			| Authors: | 
			Mohamed Saied Emam Mohamed, Fabian Werner, Jintai Ding, and Johannes Buchmann | 
			
			
			| Affiliations: | 
			TU-Darmstadt | 
			
			
			
			| Title: | 
			Stronger Password Authentication against Cross-Site Impersonation | 
			
			
			| Authors: | 
			Xavier Boyen | 
			
			
			| Affiliations: | 
			Stanford University | 
			
			
			
			| Title: | 
			Privacy-Preserving Relationship Path Discovery in Social Networks | 
			
			
			| Authors: | 
			Ghita Mezzour, Adrian Perrig, Virgil Gligor, and Panos Papadimitratos | 
			
			
			| Affiliations: | 
			Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Ecole Polytechnique Federale de Lausanne |