11. ISPEC 2015: Beijing, China

System Security

Stream cipher I

Analysis

Key Exchange Protocol

Elliptic Curve Cryptography

Stream cipher II

Authentication

Attribute-based Encryption

Mobile Security

Theory

Implementation

Privay & Indistinguishability

a service of Schloss Dagstuhl - Leibniz Center for Informatics