1 | -- | 3 | Tor Helleseth, Bart Preneel. Editorial: Special issue on recent trends in cryptography |
5 | -- | 15 | Michael Scott. Missing a trick: Karatsuba variations |
17 | -- | 26 | Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou. Backtracking-assisted multiplication |
27 | -- | 39 | Sonia Bogos, John Gaspoz, Serge Vaudenay. Cryptanalysis of a homomorphic encryption scheme |
41 | -- | 58 | Marie-Sarah Lacharité. Security of BLS and BGLS signatures in a multi-user setting |
59 | -- | 77 | Valérie Nachef, Jacques Patarin, Emmanuel Volte. Generic attacks with standard deviation analysis on a-feistel schemes |
79 | -- | 99 | Brett Hemenway, Rafail Ostrovsky. Efficient robust secret sharing from expander graphs |
101 | -- | 121 | Eloi de Chérisey, Sylvain Guilley, Annelie Heuser, Olivier Rioul. On the optimality and practicability of mutual information analysis in some scenarios |
123 | -- | 137 | Gregory G. Rose. KISS: A bit too simple |
139 | -- | 158 | Geong Sen Poh, Moesfa Soeheila Mohamad, Ji-Jian Chin. Searchable symmetric encryption over multiple servers |
159 | -- | 175 | Tomás Fabsic, Otokar Grosek, Karol Nemoga, Pavol Zajac. On generating invertible circulant binary matrices with a prescribed number of ones |
177 | -- | 193 | Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel 0001. POEx: A beyond-birthday-bound-secure on-line cipher |
195 | -- | 209 | Tingting Cui, Huaifeng Chen, Long Wen, Meiqin Wang. Statistical integral attack on CAST-256 and IDEA |
211 | -- | 233 | Cécile Pierrot, Benjamin Wesolowski. Malleability of the blockchain's entropy |