| 27 | -- | 0 | Rami Sheikh, Rosario Cammarota. Improving Performance and Mitigating Fault Attacks Using Value Prediction |
| 28 | -- | 0 | Ying-Yu Chen, Bo-Yuan Huang, Justie Su-tzu Juan. n)-Threshold Progressive Visual Secret Sharing without Expansion |
| 29 | -- | 0 | Salome James, N. B. Gayathri, P. Vasudeva Reddy. Pairing Free Identity-Based Blind Signature Scheme with Message Recovery |
| 30 | -- | 0 | Edoardo Persichetti. Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment |
| 31 | -- | 0 | Ted Krovetz. The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF |
| 32 | -- | 0 | Terry Shue Chien Lau, Chik-How Tan. A New Technique in Rank Metric Code-Based Encryption |
| 33 | -- | 0 | Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu. Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption |
| 34 | -- | 0 | Jialuo Han, Jidong Wang. An Enhanced Key Management Scheme for LoRaWAN |
| 35 | -- | 0 | Xavier Boyen, Thomas Haines. Forward-Secure Linkable Ring Signatures from Bilinear Maps |
| 36 | -- | 0 | Pratha Anuradha Kameswari, Lambadi Jyotsna. q Using Sublattice Based Techniques |
| 37 | -- | 0 | Megha Agrawal, Donghoon Chang, Jinkeon Kang. Deterministic Authenticated Encryption Scheme for Memory Constrained Devices |
| 38 | -- | 0 | James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman. Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity |
| 39 | -- | 0 | Stefania Loredana Nita, Marius Iulian Mihailescu, Valentin Corneliu Pau. Security and Cryptographic Challenges for Authentication Based on Biometrics Data |
| 40 | -- | 0 | Filippo Gandino, Bartolomeo Montrucchio, Maurizio Rebaudengo. Redundancy in Key Management for WSNs |
| 41 | -- | 0 | Christian Frøystad, Inger Anne Tøndel, Martin Gilje Jaatun. Security Incident Information Exchange for Cloud Service Provisioning Chains |
| 42 | -- | 0 | Jonathan T. Trostle. CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion |