Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version)
Knapsack cryptosystems built on NP-hard instance
Knowledge Flow Analysis for Security Protocols
Kolmogorov complexity and cryptography
LACK - a VoIP Steganographic Method
Lattice Problems and Their Reductions(Russian)
Law-Aware Access Control and its Information Model
Learning by Test-infecting Symmetric Ciphers
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
Length-based cryptanalysis: The case of Thompson's Group
Lessons Learned from the deployment of a high-interaction honeypot
Lightweight Distance bound Protocol for Low Cost RFID Tags
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Lightweight Security for Network Coding
Lightweight security mechanism for PSTN-VoIP cooperation
Likelihood that a pseudorandom sequence generator has optimal properties
Linear Relation on General Ergodic T-Function
Linear Secret Sharing from Algebraic-Geometric Codes
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem