Abstract is missing.
- QA-NIZK Arguments of Same Opening for Bilateral CommitmentsCarla Ràfols, Javier Silva 0001. 3-23 [doi]
- Signatures of Knowledge for Boolean Circuits Under Standard AssumptionsKarim Baghery, Alonso-González, Zaira Pindado, Carla Ràfols. 24-44 [doi]
- LESS is More: Code-Based Signatures Without SyndromesJean-François Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini. 45-65 [doi]
- UC Updatable Databases and ApplicationsAditya Damodaran, Alfredo Rial. 66-87 [doi]
- Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINEMohamed Tolba, Muhammad ElSheikh, Amr M. Youssef. 91-113 [doi]
- MixColumns Coefficient Property and Security of the AES with A Secret S-BoxXin An, Kai Hu, Meiqin Wang. 114-131 [doi]
- New Results on the SymSum Distinguisher on Round-Reduced SHA3Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan. 132-151 [doi]
- Cryptanalysis of FlexAEADMostafizar Rahman, Dhiman Saha, Goutam Paul 0001. 152-171 [doi]
- BBB Secure Nonce Based MAC Using Public PermutationsAvijit Dutta, Mridul Nandi. 172-191 [doi]
- On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based ProtocolAndrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper. 195-213 [doi]
- A SAT-Based Approach for Index Calculus on Binary Elliptic CurvesMonika Trimoska, Sorina Ionica, Gilles Dequen. 214-235 [doi]
- Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message SecurityMahmoud Yehia, Riham AlTawy, T. Aaron Gulliver. 239-257 [doi]
- LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stöttinger. 258-277 [doi]
- Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature CompressionMeenakshi Kansal, Ratna Dutta. 281-300 [doi]
- Sieve, Enumerate, Slice, and Lift: - Hybrid Lattice Algorithms for SVP via CVPPEmmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger. 301-320 [doi]
- Online Template Attack on ECDSA: - Extracting Keys via the Other SideNiels Roelofs, Niels Samwel, Lejla Batina, Joan Daemen. 323-336 [doi]
- When Similarities Among Devices are Taken for Granted: Another Look at PortabilityUnai Rioja, Lejla Batina, Igor Armendariz. 337-357 [doi]
- A Tale of Three Signatures: Practical Attack of ECDSA with wNAFGabrielle De Micheli, Rémi Piau, Cécile Pierrot. 361-381 [doi]
- Attacking RSA Using an Arbitrary ParameterMuhammad Rezal Kamel Ariffin, Amir Hamzah Abd Ghafar, Muhammad Asyraf Asbullah. 382-399 [doi]
- A New Encoding Algorithm for a Multidimensional Version of the Montgomery LadderAaron Hutchinson, Koray Karabina. 403-422 [doi]
- New Ideas to Build Noise-Free Homomorphic CryptosystemsGérald Gavin, Sandrine Tainturier. 423-451 [doi]