Abstract is missing.
- New Results for Rank-Based CryptographyPhilippe Gaborit, Olivier Ruatta, Julien Schrek, Gilles Zémor. 1-12 [doi]
- Proxy Re-Encryption Scheme Supporting a Selection of DelegateesJulien Devigne, Eleonora Guerrini, Fabien Laguillaumie. 13-30 [doi]
- Trapdoor Privacy in Asymmetric Searchable Encryption SchemesAfonso Arriaga, Qiang Tang, Peter Ryan. 31-50 [doi]
- Kurosawa-Desmedt Key Encapsulation Mechanism, RevisitedKaoru Kurosawa, Le Trieu Phong. 51-68 [doi]
- Differential Biases in Reduced-Round KeccakSourav Das, Willi Meier. 69-87 [doi]
- Practical Distinguishers against 6-Round Keccak-f Exploiting Self-SymmetrySukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury. 88-108 [doi]
- Preimage Attacks on Reduced-Round StribogRiham AlTawy, Amr M. Youssef. 109-125 [doi]
- Breaking the IOC Authenticated Encryption ModePaul Bottinelli, Reza Reyhanitabar, Serge Vaudenay. 126-135 [doi]
- New Treatment of the BSW Sampling and Its Applications to Stream CiphersLin Ding, Chenhui Jin, Jie Guan, Chuanda Qi. 136-146 [doi]
- Multidimensional Zero-Correlation Linear Cryptanalysis of E2Long Wen, Meiqin Wang, Andrey Bogdanov. 147-164 [doi]
- Further Improvement of Factoring RSA Moduli with Implicit HintLiqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie. 165-177 [doi]
- New Attacks on the RSA CryptosystemAbderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig. 178-198 [doi]
- Formulae for Computation of Tate Pairing on Hyperelliptic Curve Using Hyperelliptic NetsChristophe Tran. 199-214 [doi]
- New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR MicrocontrollersZhe Liu, Johann Großschädl. 215-234 [doi]
- Minimizing S-Boxes in Hardware by Utilizing Linear TransformationsSebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Marc Stöttinger. 235-250 [doi]
- Efficient Masked S-Boxes Processing - A Step Forward -Vincent Grosso, Emmanuel Prouff, François-Xavier Standaert. 251-266 [doi]
- A More Efficient AES Threshold ImplementationBegül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen. 267-284 [doi]
- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix SumKazuma Ohara, Kazuo Ohta, Koutarou Suzuki, Kazuki Yoneyama. 285-299 [doi]
- Position-Based Cryptography from Noisy ChannelsStefan Dziembowski, Maciej Zdanowicz. 300-317 [doi]
- A Comparison of the Homomorphic Encryption Schemes FV and YASHETancrède Lepoint, Michael Naehrig. 318-335 [doi]
- Towards Lattice Based Aggregate SignaturesRachid El Bansarkhani, Johannes Buchmann. 336-355 [doi]
- A Second Look at Fischlin's TransformationÖzgür Dagdelen, Daniele Venturi. 356-376 [doi]
- Anonymous IBE from Quadratic Residuosity with Improved PerformanceMichael Clear, Hitesh Tewari, Ciaran McGoldrick. 377-397 [doi]
- Expressive Attribute Based Signcryption with Constant-Size CiphertextY. Sreenivasa Rao, Ratna Dutta. 398-419 [doi]
- DRECON: DPA Resistant Encryption by ConstructionSuvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, Debdeep Mukhopadhyay. 420-439 [doi]
- Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression FunctionsFarzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel. 440-458 [doi]
- Universal Hash-Function Families: From Hashing to AuthenticationBasel Alomair. 459-474 [doi]