Abstract is missing.
- New Generic Attacks against Hash-Based MACsGaëtan Leurent, Thomas Peyrin, Lei Wang. 1-20 [doi]
- Cryptanalysis of HMAC/NMAC-WhirlpoolJian Guo 0001, Yu Sasaki, Lei Wang, Shuang Wu. 21-40 [doi]
- Lattice-Based Group Signatures with Logarithmic Signature SizeFabien Laguillaumie, Adeline Langlois, Benoît Libert, Damien Stehlé. 41-61 [doi]
- The Fiat-Shamir Transformation in a Quantum WorldÖzgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni. 62-81 [doi]
- On the Security of One-Witness Blind Signature SchemesFoteini Baldimtsi, Anna Lysyanskaya. 82-99 [doi]
- Unconditionally Secure and Universally Composable Commitments from Physical AssumptionsIvan Damgård, Alessandra Scafuro. 100-119 [doi]
- Functional Encryption from (Small) Hardware TokensKai-Min Chung, Jonathan Katz, Hong-Sheng Zhou. 120-139 [doi]
- Bounded Tamper Resilience: How to Go beyond the Algebraic BarrierIvan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi. 140-160 [doi]
- Tamper Resilient Circuits: The Adversary at the GatesAggelos Kiayias, Yiannis Tselekounis. 161-180 [doi]
- Efficient General-Adversary Multi-Party ComputationMartin Hirt, Daniel Tschudi. 181-200 [doi]
- Fair and Efficient Secure Multiparty Computation with Reputation SystemsGilad Asharov, Yehuda Lindell, Hila Zarosim. 201-220 [doi]
- Between a Rock and a Hard Place: Interpolating between MPC and FHEAshish Choudhury, Jake Loftus, Emmanuela Orsini, Arpita Patra, Nigel P. Smart. 221-240 [doi]
- Building Lossy Trapdoor Functions from Lossy EncryptionBrett Hemenway, Rafail Ostrovsky. 241-260 [doi]
- Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved ParametersYu Yu, Xiangxue Li, Jian Weng. 261-279 [doi]
- Constrained Pseudorandom Functions and Their ApplicationsDan Boneh, Brent Waters. 280-300 [doi]
- Fully Homomorphic Message AuthenticatorsRosario Gennaro, Daniel Wichs. 301-320 [doi]
- Non-uniform Cracks in the Concrete: The Power of Free PrecomputationDaniel J. Bernstein, Tanja Lange. 321-340 [doi]
- Factoring RSA Keys from Certified Smart Cards: Coppersmith in the WildDaniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren. 341-360 [doi]
- Naturally Rehearsing PasswordsJeremiah Blocki, Manuel Blum, Anupam Datta. 361-380 [doi]
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy FilterBaodong Qin, Shengli Liu. 381-400 [doi]
- On Continual Leakage of Discrete Log RepresentationsShweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs. 401-420 [doi]
- Hiding the Input-Size in Secure Two-Party ComputationYehuda Lindell, Kobbi Nissim, Claudio Orlandi. 421-440 [doi]
- Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique - (Extended Abstract)Luís T. A. N. Brandão. 441-463 [doi]
- A Heuristic for Finding Compatible Differential Paths with Application to HAS-160Aleksandar Kircanski, Riham AlTawy, Amr M. Youssef. 464-483 [doi]
- Improved Cryptanalysis of Reduced RIPEMD-160Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu. 484-503 [doi]
- Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be MeaningfulMitsugu Iwamoto, Thomas Peyrin, Yu Sasaki. 504-523 [doi]
- On Diamond Structures and Trojan Message AttacksTuomas Kortelainen, Juha Kortelainen. 524-539 [doi]