Abstract is missing.
- RingRainbow - An Efficient Multivariate Ring Signature SchemeMohamed Saied Emam Mohamed, Albrecht Petzoldt. 3-20 [doi]
- Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function EvaluationMeilof Veeningen. 21-39 [doi]
- Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing SchemeLiqun Chen, Thalia M. Laing, Keith M. Martin. 40-57 [doi]
- Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel AttacksStjepan Picek, Annelie Heuser, Alan Jovic, Axel Legay. 61-78 [doi]
- Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic ApplicationsMilena Djukanovic, Davide Bellizia, Giuseppe Scotti, Alessandro Trifiletti. 79-94 [doi]
- Differential Bias Attack for Block Cipher Under Randomized Leakage with Key EnumerationHaruhisa Kosuge, Hidema Tanaka. 95-113 [doi]
- Impossible Differential Cryptanalysis of Reduced-Round SKINNYMohamed Tolba, Ahmed Abdelkhalek 0001, Amr M. Youssef. 117-134 [doi]
- Impossible Differential Attack on Reduced Round SPARX-64/128Ahmed Abdelkhalek 0001, Mohamed Tolba, Amr M. Youssef. 135-146 [doi]
- Private Conjunctive Query over Encrypted DataTushar Kanti Saha, Takeshi Koshiba. 149-164 [doi]
- Efficient Oblivious Transfer from Lossy Threshold Homomorphic EncryptionIsheeta Nargis. 165-183 [doi]
- Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data HandlingJoppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren. 184-201 [doi]
- On Indifferentiable Hashing into the Jacobian of Hyperelliptic Curves of Genus 2Michel Seck, Hortense Boudjou, Nafissatou Diarra, Ahmed Youssef Ould Cheikh Khlil. 205-222 [doi]
- Cryptanalysis of Some Protocols Using Matrices over Group RingsMohammad Eftekhari. 223-229 [doi]