Abstract is missing.
- A Secure Group-Based AKA Protocol for Machine-Type CommunicationsRosario Giustolisi, Christian Gehrmann, Markus Ahlström, Simon Holmberg. 3-27 [doi]
- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKAChristopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu. 28-48 [doi]
- A Practical Post-Quantum Public-Key Cryptosystem Based on \textsf spLWEJung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee, Yongha Son. 51-74 [doi]
- Analysis of Error Terms of Signatures Based on Learning with ErrorsJeongsu Kim, Suyong Park, Seonggeun Kim, Busik Jang, Sang Geun Hahn, Sangim Jung, Dongyoung Roh. 75-97 [doi]
- Transforming Hidden Vector Encryption Schemes from Composite to Prime Order GroupsKwangsu Lee. 101-125 [doi]
- Lossy Key Encapsulation Mechanism and Its ApplicationsYamin Liu, Xianhui Lu, Bao Li, Haiyang Xue. 126-144 [doi]
- Expanded Framework for Dual System Encryption and Its ApplicationMinqian Wang, Zhenfeng Zhang. 145-160 [doi]
- Adaptively Secure Broadcast Encryption with DealershipKamalesh Acharya, Ratna Dutta. 161-177 [doi]
- A New Algorithm for Residue Multiplication Modulo 2^521-1Shoukat Ali, Murat Cenk. 181-193 [doi]
- Enhancing Data Parallelism of Fully Homomorphic EncryptionPaulo Martins, Leonel Sousa. 194-207 [doi]
- An Improvement of Optimal Ate Pairing on KSS Curve with Pseudo 12-Sparse MultiplicationMd. Al-Amin Khandaker, Hirotaka Ono, Yasuyuki Nogami, Masaaki Shirase, Sylvain Duquesne. 208-219 [doi]
- Revisiting the Cubic UOV Signature SchemeDung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi. 223-238 [doi]
- Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle ModelJinyong Chang, Honglong Dai, MaoZhi Xu, Rui Xue. 239-253 [doi]
- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving FairnessSumit Kumar Debnath, Ratna Dutta. 254-284 [doi]
- Improved Results on Cryptanalysis of Prime Power RSALiqiang Peng, Lei Hu, Yao Lu. 287-303 [doi]
- On Computing the Immunity of Boolean Power Functions Against Fast Algebraic AttacksYusong Du, Baodian Wei. 304-316 [doi]
- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same RoundJingyi Feng, Hua Chen, Si Gao, Limin Fan, Dengguo Feng. 317-332 [doi]
- On the Effectiveness of Code-Reuse-Based Android Application ObfuscationXiaoxiao Tang, Yu Liang, Xinjie Ma, Yan Lin, Debin Gao. 333-349 [doi]