Abstract is missing.
- Shorter Quasi-Adaptive NIZK Proofs for Linear SubspacesCharanjit S. Jutla, Arnab Roy. 1-20 [doi]
- Constant-Round Concurrent Zero Knowledge in the Bounded Player ModelVipul Goyal, Abhishek Jain 0002, Rafail Ostrovsky, Silas Richelson, Ivan Visconti. 21-40 [doi]
- Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting CodesHelger Lipmaa. 41-60 [doi]
- Families of Fast Elliptic Curves from ℚ-curvesBenjamin Smith. 61-78 [doi]
- Four-Dimensional GLV via the Weil RestrictionAurore Guillevic, Sorina Ionica. 79-96 [doi]
- Discrete Gaussian Leftover Hash Lemma over Infinite DomainsShweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai. 97-116 [doi]
- New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in CryptographyGilles Macario-Rat, Jérôme Plût, Henri Gilbert. 117-133 [doi]
- Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption RevisitedSandro Coretti, Ueli Maurer, Björn Tackmann. 134-153 [doi]
- Reset Indifferentiability and Its ConsequencesPaul Baecher, Christina Brzuska, Arno Mittelbach. 154-173 [doi]
- Computational Fuzzy ExtractorsBenjamin Fuller, Xianrui Meng, Leonid Reyzin. 174-193 [doi]
- Efficient One-Way Secret-Key Agreement and Private Channel Coding via PolarizationJoseph M. Renes, Renato Renner, David Sutter. 194-213 [doi]
- SPHF-Friendly Non-interactive CommitmentsMichel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval. 214-234 [doi]
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better EfficiencyKwangsu Lee, Seung Geol Choi, Dong-Hoon Lee, Jong Hwan Park, Moti Yung. 235-254 [doi]
- Function-Private Subspace-Membership Encryption and Its ApplicationsDan Boneh, Ananth Raghunathan, Gil Segev. 255-275 [doi]
- Random Projections, Graph Sparsification, and Differential PrivacyJalaj Upadhyay. 276-295 [doi]
- Notions of Black-Box Reductions, RevisitedPaul Baecher, Christina Brzuska, Marc Fischlin. 296-315 [doi]
- Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable CommitmentsDana Dachman-Soled, Tal Malkin, Mariana Raykova 0001, Muthuramakrishnan Venkitasubramaniam. 316-336 [doi]
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. 337-356 [doi]
- Key Difference Invariant Bias in Block CiphersAndrey Bogdanov, Christina Boura, Vincent Rijmen, Meiqin Wang, Long Wen, Jingyuan Zhao. 357-376 [doi]
- Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALEShengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu. 377-404 [doi]
- A Modular Framework for Building Variable-Input-Length Tweakable CiphersThomas Shrimpton, R. Seth Terashima. 405-423 [doi]
- Parallelizable and Authenticated Online CiphersElena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda. 424-443 [doi]
- How to Construct an Ideal Cipher from a Small Set of Public PermutationsRodolphe Lampe, Yannick Seurin. 444-463 [doi]
- Generic Key Recovery Attack on Feistel SchemeTakanori Isobe, Kyoji Shibutani. 464-485 [doi]
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection TestsLuke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wójcik. 486-505 [doi]
- Behind the Scene of Side Channel AttacksVictor Lomné, Emmanuel Prouff, Thomas Roche. 506-525 [doi]
- SCARE of Secret Ciphers with SPN StructuresMatthieu Rivain, Thomas Roche. 526-544 [doi]