Abstract is missing.
- Solving LPN Using Covering CodesQian Guo, Thomas Johansson, Carl Löndahl. 1-20 [doi]
- Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special FormJean-Charles Faugère, Ludovic Perret, Frédéric de Portzamparc. 21-41 [doi]
- Bivariate Polynomials Modulo Composites and Their ApplicationsDan Boneh, Henry Corrigan-Gibbs. 42-62 [doi]
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich. 63-84 [doi]
- Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption ModesPhilipp Jovanovic, Atul Luykx, Bart Mennink. 85-104 [doi]
- How to Securely Release Unverified Plaintext in Authenticated EncryptionElena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda. 105-125 [doi]
- Forging Attacks on Two Authenticated Encryption Schemes COBRA and POETMridul Nandi. 126-140 [doi]
- Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang. 141-157 [doi]
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block CiphersSiwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song. 158-178 [doi]
- Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and SimonChristina Boura, María Naya-Plasencia, Valentin Suder. 179-199 [doi]
- A Simplified Representation of AESHenri Gilbert. 200-222 [doi]
- Simulatable Leakage: Analysis, Pitfalls, and New ConstructionsJake Longo Galea, Daniel P. Martin, Elisabeth Oswald, Daniel Page, Martijn Stam, Michael Tunstall. 223-242 [doi]
- Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop ComputerLuke Mather, Elisabeth Oswald, Carolyn Whitnall. 243-261 [doi]
- GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce BiasDiego F. Aranha, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Mehdi Tibouchi, Jean-Christophe Zapalowicz. 262-281 [doi]
- Soft Analytical Side-Channel AttacksNicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert. 282-296 [doi]
- On the Enumeration of Double-Base Chains with Applications to Elliptic Curve CryptographyChristophe Doche. 297-316 [doi]
- Kummer Strikes Back: New DH Speed RecordsDaniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe. 317-337 [doi]
- Jacobian Coordinates on Genus 2 CurvesHüseyin Hisil, Craig Costello. 338-357 [doi]
- Mersenne Factorization FactoryThorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra. 358-377 [doi]
- Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite FieldsAntoine Joux, Cécile Pierrot. 378-397 [doi]
- Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt. 398-419 [doi]
- Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCEPierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati. 420-438 [doi]
- Cryptanalysis of Iterated Even-Mansour Schemes with Two KeysItai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. 439-457 [doi]
- Meet-in-the-Middle Attacks on Generic Feistel ConstructionsJian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki. 458-477 [doi]
- XLS is Not a Strong Pseudorandom PermutationMridul Nandi. 478-490 [doi]
- Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous CredentialsChristian Hanser, Daniel Slamanig. 491-511 [doi]
- On Tight Security Proofs for Schnorr SignaturesNils Fleischhacker, Tibor Jager, Dominique Schröder. 512-531 [doi]
- Square Span Programs with Applications to Succinct NIZK ArgumentsGeorge Danezis, Cédric Fournet, Jens Groth, Markulf Kohlweiss. 532-550 [doi]
- Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group SignaturesFabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven. 551-572 [doi]