Abstract is missing.
- Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based CryptographyCarlos Aguilar Melchor, Martin R. Albrecht, Thomas Ricosset. 3-19 [doi]
- Simple Security Definitions for and Constructions of 0-RTT Key ExchangeBritta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk. 20-38 [doi]
- TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRFStanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu. 39-58 [doi]
- Secure and Efficient Pairing at 256-Bit Security LevelYutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi. 59-79 [doi]
- No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile DevicesRiccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran. 83-102 [doi]
- Are You Lying: Validating the Time-Location of Outdoor ImagesXiaopeng Li, Wenyuan Xu, Song Wang, Xianshan Qu. 103-123 [doi]
- Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security TasksBruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik. 124-144 [doi]
- A Pilot Study of Multiple Password Interference Between Text and Map-Based PasswordsWeizhi Meng, Wenjuan Li, Lee Wang Hao, Lijun Jiang, Jianying Zhou. 145-162 [doi]
- Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-SecurityYi-Ruei Chen, Wen-Guey Tzeng. 165-183 [doi]
- A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against TriviumMarco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini. 184-207 [doi]
- Related-Key Impossible-Differential Attack on Reduced-Round SkinnyRalph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang. 208-228 [doi]
- Faster Secure Multi-party Computation of AES and DES Using Lookup TablesMarcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek. 229-249 [doi]
- An Experimental Study of the BDD Approach for the Search LWE ProblemRui Xu, Sze-Ling Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen. 253-272 [doi]
- Efficiently Obfuscating Re-Encryption Program Under DDH AssumptionAkshayaram Srinivasan, Chandrasekaran Pandu Rangan. 273-292 [doi]
- Lattice-Based Group Signatures: Achieving Full Dynamicity with EaseSan Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu. 293-312 [doi]
- Breaking and Fixing Mobile App Authentication with OAuth2.0-based ProtocolsRonghai Yang, Wing Cheong Lau, Shangcheng Shi. 313-335 [doi]
- Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)David Bernhard, Ngoc Khanh Nguyen, Bogdan Warinschi. 336-353 [doi]
- More Efficient Construction of Bounded KDM Secure EncryptionKaoru Kurosawa, Rie Habuka. 354-372 [doi]
- Signature Schemes with Randomized VerificationCody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, Brent Waters. 373-389 [doi]
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel ResilienceClaude Carlet, Annelie Heuser, Stjepan Picek. 393-414 [doi]
- A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening LayersChenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma. 415-434 [doi]
- Side-Channel Attacks Meet Secure Network ProtocolsAlex Biryukov, Daniel Dinu, Yann Le Corre. 435-454 [doi]
- Lattice-Based DAPS and Generalizations: Self-enforcement in Signature SchemesDan Boneh, Sam Kim, Valeria Nikolaenko. 457-477 [doi]
- Forward-Secure Searchable Encryption on Labeled Bipartite GraphsRussell W. F. Lai, Sherman S. M. Chow. 478-497 [doi]
- Bounds in Various Generalized Settings of the Discrete Logarithm ProblemJason H. M. Ying, Noboru Kunihiro. 498-517 [doi]
- An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic CryptanalysisSze-Ling Yeo, Zhen Li, Khoongming Khoo, Yu Bin Low. 518-536 [doi]
- SCRAPE: Scalable Randomness Attested by Public EntitiesIgnacio Cascudo, Bernardo David. 537-556 [doi]
- cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic OperationsDavid Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman. 557-578 [doi]
- Almost Optimal Oblivious Transfer from QA-NIZKOlivier Blazy, Céline Chevalier, Paul Germouty. 579-598 [doi]
- OnionPIR: Effective Protection of Sensitive Metadata in Online Communication NetworksDaniel Demmler, Marco Holz, Thomas Schneider 0003. 599-619 [doi]
- Accountable StorageGiuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia. 623-644 [doi]
- Maliciously Secure Multi-Client ORAMMatteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder. 645-664 [doi]
- Legacy-Compliant Data Authentication for Industrial Control System TrafficJohn Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer, Martín Ochoa. 665-685 [doi]
- Multi-client Oblivious RAM Secure Against Malicious ServersErik-Oliver Blass, Travis Mayberry, Guevara Noubir. 686-707 [doi]