Abstract is missing.
- Keyed-Fully Homomorphic Encryption Without Indistinguishability ObfuscationShingo Sato, Keita Emura, Atsushi Takayasu. 3-23 [doi]
- A Performance Evaluation of Pairing-Based Broadcast Encryption SystemsArush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala. 24-44 [doi]
- An Optimized GHV-Type HE Scheme: Simpler, Faster, and More VersatileLiang Zhao, Ze Chen, Liqun Chen, Xinyi Huang. 45-64 [doi]
- Analyzing the Provable Security Bounds of GIFT-COFB and Photon-BeetleAkiko Inoue, Tetsu Iwata, Kazuhiko Minematsu. 67-84 [doi]
- Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort DeauthenticationPrakash Shrestha, Nitesh Saxena. 85-104 [doi]
- ZLeaks: Passive Inference Attacks on Zigbee Based Smart HomesNarmeen Shafqat, Daniel J. Dubois, David R. Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan. 105-125 [doi]
- Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search SchemesMarco Dijkslag, Marc Damie, Florian Hahn 0004, Andreas Peter. 126-146 [doi]
- Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting TechniquesZengrui Liu, Prakash Shrestha, Nitesh Saxena. 147-169 [doi]
- Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process KnowledgeHerson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter. 170-192 [doi]
- RSA Key Recovery from Digit Equivalence InformationChitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom. 193-211 [doi]
- Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number GeneratorsFlorette Martinez. 212-229 [doi]
- Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key BridgesHosein Hadipour, Maria Eichlseder. 230-250 [doi]
- KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round TripFelix Günther 0001, Simon Rastikian, Patrick Towa, Thom Wiggers. 253-272 [doi]
- Improving the Privacy of Tor Onion ServicesEdward Eaton, Sajin Sasy, Ian Goldberg. 273-292 [doi]
- Privacy-Preserving Authenticated Key Exchange for Constrained DevicesLoïc Ferreira. 293-312 [doi]
- Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting ProtocolsAlisa Pankova, Jan Willemson. 313-333 [doi]
- An Approach to Generate Realistic HTTP Parameters for Application Layer DeceptionMerve Sahin, Cédric Hébert, Rocío Cabrera Lozoya. 337-355 [doi]
- IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS ProtocolYue Sun, Shichao Lv, Jianzhou You, Yuyan Sun, Xin Chen, Yaowen Zheng, Limin Sun. 356-375 [doi]
- Probing for Passwords - Privacy Implications of SSIDs in Probe RequestsJohanna Ansohn McDougall, Christian Burkert, Daniel Demmler, Monina Schwarz, Vincent Hubbe, Hannes Federrath. 376-395 [doi]
- A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-LinkingGhada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade 0001, Adina Nedelcu, Cristina Onete, Léo Robert. 399-418 [doi]
- Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBETsz Hon Yuen, Cong Zhang 0001, Sherman S. M. Chow. 419-439 [doi]
- Progressive and Efficient Verification for Digital SignaturesCecilia Boschini, Dario Fiore 0001, Elena Pagnin. 440-458 [doi]
- Revocable Hierarchical Attribute-Based Signatures from LatticesDaniel Gardham, Mark Manulis. 459-479 [doi]
- Covert Authentication from LatticesRajendra Kumar, Khoa Nguyen. 480-500 [doi]
- Spreading the Privacy Blanket: - Differentially Oblivious Shuffling for Differential PrivacyS. Dov Gordon, Jonathan Katz, Mingyu Liang, Jiayu Xu. 501-520 [doi]
- Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret EncapsulationJean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux. 521-541 [doi]
- (Commit-and-Prove) Predictable Arguments with PrivacyHamidreza Khoshakhlagh. 542-561 [doi]
- Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest MajoritiesKarim Eldefrawy, Tancrède Lepoint, Antonin Leroux. 565-584 [doi]
- PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical FunctionsJason H. M. Ying, Shuwei Cao 0002, Geong Sen Poh, Jia Xu 0006, Hoon Wei Lim. 585-604 [doi]
- Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFAKittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura. 605-625 [doi]
- Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user SecuritySaikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee. 626-642 [doi]
- Efficient Two-Party Exponentiation from Quotient TransferYi Lu, Keisuke Hara, Kazuma Ohara, Jacob C. N. Schuldt, Keisuke Tanaka. 643-662 [doi]
- Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPCThomas Attema, Vincent Dunning, Maarten H. Everts, Peter Langenkamp. 663-683 [doi]
- How Byzantine is a Send Corruption?Karim Eldefrawy, Julian Loss, Ben Terner. 684-704 [doi]
- Babel Fees via Limited LiabilitiesManuel M. T. Chakravarty, Nikos Karayannidis, Aggelos Kiayias, Michael Peyton Jones, Polina Vinogradova. 707-726 [doi]
- FAST: Fair Auctions via Secret TransactionsBernardo David, Lorenzo Gentile, Mohsen Pourpouneh. 727-747 [doi]
- Astrape: Anonymous Payment Channels with Boring CryptographyYuhao Dong, Ian Goldberg, Sergey Gorbunov 0001, Raouf Boutaba. 748-768 [doi]
- A White-Box Speck Implementation Using Self-equivalence EncodingsJoachim Vandersmissen, Adrián Ranea, Bart Preneel. 771-791 [doi]
- Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64Feifan Wang, Gaoli Wang. 792-808 [doi]
- Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck DistinguisherNicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek. 809-829 [doi]
- Carry-Less to BIKE FasterMing-Shing Chen, Tim Güneysu, Markus Krausz, Jan Philipp Thoma. 833-852 [doi]
- Faster Kyber and Dilithium on the Cortex-M4Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Daan Sprenkels. 853-871 [doi]
- Quantum-Resistant Software Update Security on Low-Power Networked Embedded DevicesGustavo Banegas, Koen Zandberg, Emmanuel Baccelli, Adrian Herrmann, Benjamin Smith 0003. 872-891 [doi]
- Post-quantum ID-Based Ring Signatures from Symmetric-Key PrimitivesMaxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad. 892-912 [doi]