Abstract is missing.
- Rate-Optimizing Compilers for Continuously Non-malleable CodesSandro Coretti, Antonio Faonio, Daniele Venturi 0001. 3-23 [doi]
- Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End EncryptionJens Müller 0007, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk. 24-42 [doi]
- Cryptanalysis of ForkAESSubhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki. 43-63 [doi]
- Short Lattice-Based One-out-of-Many Proofs and Applications to Ring SignaturesMuhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu. 67-88 [doi]
- Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature LengthDaniel Gardham, Mark Manulis. 89-109 [doi]
- Raptor: A Practical Lattice-Based (Linkable) Ring SignatureXingye Lu, Man Ho Au, Zhenfei Zhang. 110-130 [doi]
- Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday BoundAlexander Moch, Eik List. 131-151 [doi]
- DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode MappingXiaoyang Cheng, Yan Lin 0003, Debin Gao, Chunfu Jia. 155-174 [doi]
- Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control SystemsJairo Giraldo, David I. Urbina, Alvaro A. Cárdenas, Nils Ole Tippenhauer. 175-195 [doi]
- A Modular Hybrid Learning Approach for Black-Box Security Testing of CPSJohn Henry Castellanos, Jianying Zhou 0001. 196-216 [doi]
- PassGAN: A Deep Learning Approach for Password GuessingBriland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Pérez-Cruz. 217-237 [doi]
- Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative MinersSang-Yoon Chang, Younghee Park, Simeon Wuthier, Chang-Wu Chen. 241-258 [doi]
- Longitudinal Analysis of Misuse of BitcoinKarim Eldefrawy, Ashish Gehani, Alexandre Matton. 259-278 [doi]
- Faster Multiplication in \mathbb Z_2^m[x] on Cortex-M4 to Speed up NIST PQC CandidatesMatthias J. Kannwischer, Joost Rijneveld, Peter Schwabe. 281-301 [doi]
- Generic and Practical Key Establishment from LatticeZhengzhong Jin, Yunlei Zhao. 302-322 [doi]
- One Sample Ring-LWE with Rounding and Its Application to Key ExchangeJintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang. 323-343 [doi]
- Masking Dilithium - Efficient Implementation and Side-Channel EvaluationVincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque. 344-362 [doi]
- Proxy Re-Encryption and Re-Signatures from LatticesXiong Fan, Feng-Hao Liu. 363-382 [doi]
- DL-Extractable UC-Commitment SchemesBehzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac 0001. 385-405 [doi]
- A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order GroupsJongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li 0007. 406-425 [doi]
- Unbounded Inner-Product Functional Encryption with Succinct KeysEdouard Dufour Sans, David Pointcheval. 426-441 [doi]
- Password-Authenticated Public-Key EncryptionTatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu. 442-462 [doi]
- Public Immunization Against Complete Subversion Without Random OraclesGiuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi 0001. 465-485 [doi]
- Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof SystemShifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu 0001, Joseph K. Liu. 486-506 [doi]
- Benchmarking Privacy Preserving Scientific OperationsAbdelrahaman Aly, Nigel P. Smart. 509-529 [doi]
- Turbospeedz: Double Your Online SPDZ! Improving SPDZ Using Function Dependent PreprocessingAner Ben-Efraim, Michael Nielsen 0007, Eran Omri. 530-549 [doi]
- pRate: Anonymous Star Rating with Rating SecrecyJia Liu, Mark Manulis. 550-570 [doi]
- Masking Fuzzy-Searchable Public DatabasesAlexandra Boldyreva, Tianxin Tang, Bogdan Warinschi. 571-591 [doi]
- Homomorphic Training of 30, 000 Logistic Regression ModelsFlávio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt. 592-611 [doi]