| 1071 | -- | 1094 | Felipe G. Lacerda, Joseph M. Renes, Renato Renner. Classical Leakage Resilience from Fault-Tolerant Quantum Computation |
| 1095 | -- | 1143 | Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff. White-Box Cryptography: Don't Forget About Grey-Box Attacks |
| 1144 | -- | 1199 | Carmit Hazay, Avishay Yanai. Constant-Round Maliciously Secure Two-Party Computation in the RAM Model |
| 1200 | -- | 1262 | Carmit Hazay, Muthuramakrishnan Venkitasubramaniam. What Security Can We Achieve Within 4 Rounds? |
| 1263 | -- | 1297 | Alexandre Duc, Sebastian Faust, François-Xavier Standaert. Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version |
| 1298 | -- | 1336 | Razvan Barbulescu, Sylvain Duquesne. Updating Key Size Estimations for Pairings |
| 1337 | -- | 1382 | Atsushi Takayasu, Yao Lu 0002, Liqiang Peng. Small CRT-Exponent RSA Revisited |
| 1383 | -- | 1422 | Yosuke Todo, Gregor Leander, Yu Sasaki. Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64 |
| 1423 | -- | 1447 | Colin Chaigneau, Thomas Fuhr 0001, Henri Gilbert, Jérémy Jean, Jean-René Reinhard. Cryptanalysis of NORX v2.0 |
| 1448 | -- | 1490 | Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications |
| 1491 | -- | 1573 | Tatsuaki Okamoto, Katsuyuki Takashima. Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption |