Abstract is missing.
- Blending FHE-NTRU Keys - The Excalibur PropertyLouis Goubin, Francisco José Vial Prado. 3-24 [doi]
- Approximate-Deterministic Public Key Encryption from Hard Learning ProblemsYamin Liu, Xianhui Lu, Bao Li, Wenpan Jing, Fuyang Fang. 25-42 [doi]
- Adaptively Secure Strong Designated SignatureNeetu Sharma, Rajeev Anand Sahu, Vishal Saraswat, Birendra Kumar Sharma. 43-60 [doi]
- The Shortest Signatures EverMohamed Saied Emam Mohamed, Albrecht Petzoldt. 61-77 [doi]
- CRT-Based Outsourcing Algorithms for Modular ExponentiationsLakshmi Kuppusamy, Jothi Rangasamy. 81-98 [doi]
- Verifiable Computation for Randomized AlgorithmMuhua Liu, Ying Wu, Rui Xue. 99-118 [doi]
- UC-secure and Contributory Password-Authenticated Group Key ExchangeLin Zhang, Zhenfeng Zhang. 119-134 [doi]
- Score-Based vs. Probability-Based Enumeration - A Cautionary NoteMarios O. Choudary, Romain Poussier, François-Xavier Standaert. 137-152 [doi]
- Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based SignaturesPeter Pessl. 153-170 [doi]
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption CoreSubhadeep Banik, Andrey Bogdanov, Francesco Regazzoni. 173-190 [doi]
- Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGABrian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani. 191-206 [doi]
- AEZ: Anything-But EaZy in HardwareEkawat Homsirikamol, Kris Gaj. 207-224 [doi]
- Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from ObfuscationAfonso Arriaga, Manuel Barbosa, Pooya Farshim. 227-247 [doi]
- Revocable Decentralized Multi-Authority Functional EncryptionHikaru Tsuchida, Takashi Nishide, Eiji Okamoto, Kwangjo Kim. 248-265 [doi]
- On Linear Hulls and TrailsTomer Ashur, Vincent Rijmen. 269-286 [doi]
- Related-Key Cryptanalysis of MidoriDavid Gérault, Pascal Lafourcade 0001. 287-304 [doi]
- Some Proofs of Joint Distributions of Keystream Biases in RC4Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi. 305-321 [doi]
- Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCELorenzo Grassi 0001, Christian Rechberger. 322-342 [doi]
- On Negation Complexity of Injections, Surjections and Collision-Resistance in CryptographyDouglas Miller, Adam Scrivener, Jesse Stern, Muthuramakrishnan Venkitasubramaniam. 345-363 [doi]
- Implicit Quadratic Property of Differentially 4-Uniform PermutationsTheo Fanuela Prabowo, Chik-How Tan. 364-379 [doi]
- Secret Sharing for mNP: Completeness ResultsMahabir Prasad Jhanwar, Kannan Srinathan. 380-390 [doi]
- Receiver Selective Opening Security from Indistinguishability ObfuscationDingding Jia, Xianhui Lu, Bao Li. 393-410 [doi]
- Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption SchemesKishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray. 411-428 [doi]