Abstract is missing.
- Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS CurvesArmando Faz-Hernández, Patrick Longa, Ana H. Sanchez. 1-27 [doi]
- An Improved Compression Technique for Signatures Based on Learning with ErrorsShi Bai, Steven D. Galbraith. 28-47 [doi]
- A Generic View on Trace-and-Revoke Broadcast Encryption SchemesDennis Hofheinz, Christoph Striecks. 48-63 [doi]
- Broadcast SteganographyNelly Fazio, Antonio Nicolosi, Irippuge Milinda Perera. 64-84 [doi]
- Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and ApplicationsSherman S. M. Chow, Matthew K. Franklin, Haibin Zhang. 85-105 [doi]
- Attacking PUF-Based Pattern Matching Key Generators via Helper Data ManipulationJeroen Delvaux, Ingrid Verbauwhede. 106-131 [doi]
- On Increasing the Throughput of Stream CiphersFrederik Armknecht, Vasily Mikhalev. 132-151 [doi]
- On Double Exponentiation for Securing RSA against Fault AnalysisDuc-Phong Le, Matthieu Rivain, Chik-How Tan. 152-168 [doi]
- On the Practical Security of a Leakage Resilient Masking SchemeEmmanuel Prouff, Matthieu Rivain, Thomas Roche. 169-182 [doi]
- The Myth of Generic DPA...and the Magic of LearningCarolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert. 183-205 [doi]
- Hardware Implementation and Side-Channel Analysis of LapinLubos Gaspar, Gaëtan Leurent, François-Xavier Standaert. 206-226 [doi]
- Automatic Search for Differential Trails in ARX CiphersAlex Biryukov, Vesselin Velichkov. 227-250 [doi]
- CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ FunctionsMarkku-Juhani O. Saarinen. 251-269 [doi]
- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge PermutationMarkku-Juhani O. Saarinen. 270-285 [doi]
- Group Signatures with Message-Dependent Opening in the Standard ModelBenoît Libert, Marc Joye. 286-306 [doi]
- Practical Distributed Signatures in the Standard ModelYujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu. 307-326 [doi]
- Decentralized Traceable Attribute-Based SignaturesAli El Kaafarani, Essam Ghadafi, Dalia Khader. 327-348 [doi]
- Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential SolutionsTheresa Calderon, Sarah Meiklejohn, Hovav Shacham, Brent Waters. 349-366 [doi]
- P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital SignaturesQiong Huang, Duncan S. Wong, Willy Susilo. 367-384 [doi]
- 2-Pass Key Exchange Protocols from CPA-Secure KEMKaoru Kurosawa, Jun Furukawa. 385-401 [doi]
- Analysis of BLAKE2Jian Guo 0001, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu. 402-423 [doi]
- An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for GrøstlYu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta. 424-443 [doi]
- Practical Collision Attack on 40-Step RIPEMD-128Gaoli Wang. 444-460 [doi]
- KDM Security in the Hybrid FrameworkGareth T. Davies, Martijn Stam. 461-480 [doi]
- Key Wrapping with a Fixed PermutationDmitry Khovratovich. 481-499 [doi]