Abstract is missing.
- A Cryptographic Analysis of the WireGuard ProtocolBenjamin Dowling, Kenneth G. Paterson. 3-21 [doi]
- Distributed SSH Key Management with Proactive RSA Threshold SignaturesYotam Harchol, Ittai Abraham, Benny Pinkas. 22-43 [doi]
- Non-interactive Zaps of KnowledgeGeorg Fuchsbauer, Michele Orrù. 44-62 [doi]
- Formal Verification of Side-Channel Countermeasures via Elementary Circuit TransformationsJean-Sébastien Coron. 65-82 [doi]
- Drive-By Key-Extraction Cache Attacks from Portable CodeDaniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom. 83-102 [doi]
- On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box CryptographyEstuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff. 103-120 [doi]
- Continuously Non-malleable Codes with Split-State RefreshAntonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi 0001. 121-139 [doi]
- Efficient Unconditionally Secure Signatures Using Universal HashingRyan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson. 143-162 [doi]
- Floppy-Sized Group Signatures from LatticesCecilia Boschini, Jan Camenisch, Gregory Neven. 163-182 [doi]
- On the Security Notions for Homomorphic SignaturesDario Catalano, Dario Fiore, Luca Nizzardo. 183-201 [doi]
- Invisible Sanitizable Signatures and Public-Key Encryption are EquivalentMarc Fischlin, Patrick Harasser. 202-220 [doi]
- Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable SignaturesJohannes Blömer, Jan Bobolz. 221-239 [doi]
- Privacy-Preserving Ridge Regression with only Linearly-Homomorphic EncryptionIrene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon. 243-261 [doi]
- Privacy-Preserving Plaintext-Equality of Low-Entropy InputsSébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré. 262-279 [doi]
- Nothing Refreshes Like a RePSI: Reactive Private Set IntersectionAndrea Cerulli, Emiliano De Cristofaro, Claudio Soriente. 280-300 [doi]
- New Protocols for Secure Equality Test and ComparisonGeoffroy Couteau. 303-320 [doi]
- Minimising Communication in Honest-Majority MPC by Batchwise Multiplication VerificationPeter Sebastian Nordholt, Meilof Veeningen. 321-339 [doi]
- Best of Both Worlds in Secure Computation, with Low Communication OverheadDaniel Genkin, S. Dov Gordon, Samuel Ranellucci. 340-359 [doi]
- 3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch RetrievalStanislaw Jarecki, Boyang Wei. 360-378 [doi]
- MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited BandwidthRalph Ankele, Florian Böhl, Simon Friedberger. 381-399 [doi]
- KangarooTwelve: Fast Hashing Based on Keccak-pGuido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier. 400-418 [doi]
- Related-Key Boomerang Attacks on Full ANU Lightweight Block CipherYu Sasaki. 421-439 [doi]
- Generic Round-Function-Recovery Attacks for Feistel Networks over Small DomainsF. Betül Durak, Serge Vaudenay. 440-458 [doi]
- Differential Cryptanalysis of Round-Reduced Sparx-64/128Ralph Ankele, Eik List. 459-475 [doi]
- Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity AttacksSerge Vaudenay, Damian Vizár. 476-494 [doi]
- Improved Anonymous Broadcast Encryptions - Tight Security and Shorter CiphertextJiangtao Li, Junqing Gong. 497-515 [doi]
- Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation ListJoseph K. Liu, Tsz Hon Yuen, Peng Zhang 0029, Kaitai Liang. 516-534 [doi]
- Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on LatticesXavier Boyen, Qinyi Li. 535-553 [doi]
- In-Region AuthenticationMd. Mamunur Rashid Akand, Reihaneh Safavi-Naini. 557-578 [doi]
- Formal Analysis of Distance Bounding with Secure HardwareHandan Kilinç, Serge Vaudenay. 579-597 [doi]
- KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric NetworksIvan Oliveira Nunes, Gene Tsudik. 598-615 [doi]
- Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture BiometricTyler Kaczmarek, Ercan Ozturk, Gene Tsudik. 616-633 [doi]
- Stateful Multi-client Verifiable ComputationChristian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann. 637-656 [doi]
- VeriCount: Verifiable Resource Accounting Using Hardware and Software IsolationShruti Tople, Soyeon Park, Min-Suk Kang, Prateek Saxena. 657-677 [doi]
- Message-Locked Encryption with File UpdateSuyash Kandele, Souradyuti Paul. 678-695 [doi]
- DogFish: Decentralized Optimistic Game-theoretic FIle SHaringSeny Kamara, Alptekin Küpçü. 696-714 [doi]