Abstract is missing.
- Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight SecurityBenoît Libert, Marc Joye, Moti Yung, Thomas Peters. 1-21 [doi]
- Efficient Identity-Based Encryption over NTRU LatticesLéo Ducas, Vadim Lyubashevsky, Thomas Prest. 22-41 [doi]
- Order-Preserving Encryption Secure Beyond One-WaynessIsamu Teranishi, Moti Yung, Tal Malkin. 42-61 [doi]
- 2 n) OverheadKai-Min Chung, Zhenming Liu, Rafael Pass. 62-81 [doi]
- Adaptive Security of Constrained PRFsGeorg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao. 82-101 [doi]
- Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs ObfuscationMihir Bellare, Igors Stepanovs, Stefano Tessaro. 102-121 [doi]
- Using Indistinguishability Obfuscation via UCEsChristina Brzuska, Arno Mittelbach. 122-141 [doi]
- Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary InputChristina Brzuska, Arno Mittelbach. 142-161 [doi]
- Bootstrapping Obfuscators via Fast Pseudorandom FunctionsBenny Applebaum. 162-172 [doi]
- Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext AttackChihong Joo, Aaram Yun. 173-192 [doi]
- Authenticating Computation on Groups: New Homomorphic Primitives and ApplicationsDario Catalano, Antonio Marcedone, Orazio Puglisi. 193-212 [doi]
- Compact VSS and Efficient Homomorphic UC CommitmentsIvan Damgård, Bernardo Machado David, Irene Giacomelli, Jesper Buus Nielsen. 213-232 [doi]
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only ModelStanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk. 233-253 [doi]
- Secret-Sharing for NPIlan Komargodski, Moni Naor, Eylon Yogev. 254-273 [doi]
- Tweaks and Keys for Block Ciphers: The TWEAKEY FrameworkJérémy Jean, Ivica Nikolic, Thomas Peyrin. 274-288 [doi]
- Memory-Demanding Password ScramblingChristian Forler, Stefan Lucks, Jakob Wenzel. 289-305 [doi]
- Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCMSonia Belaïd, Pierre-Alain Fouque, Benoît Gérard. 306-325 [doi]
- Higher-Order Threshold ImplementationsBegül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen. 326-343 [doi]
- Masks Will Fall Off - Higher-Order Optimal DistinguishersNicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul. 344-365 [doi]
- Black-Box Separations for One-More (Static) CDH and Its GeneralizationJiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang. 366-385 [doi]
- Black-Box Separations for Differentially Private ProtocolsDakshita Khurana, Hemanta K. Maji, Amit Sahai. 386-405 [doi]
- Composable Security of Delegated Quantum ComputationVedran Dunjko, Joseph Fitzsimons, Christopher Portmann, Renato Renner. 406-425 [doi]
- All-But-Many Encryption - A New Framework for Fully-Equipped UC CommitmentsEiichiro Fujisaki. 426-447 [doi]
- Multi-valued Byzantine Broadcast: The t < n CaseMartin Hirt, Pavel Raykov. 448-465 [doi]
- Fairness versus Guaranteed Output Delivery in Secure Multiparty ComputationRan Cohen, Yehuda Lindell. 466-485 [doi]
- Actively Secure Private Function EvaluationPayman Mohassel, Seyed Saeed Sadeghian, Nigel P. Smart. 486-505 [doi]
- Efficient, Oblivious Data Structures for MPCMarcel Keller, Peter Scholl. 506-525 [doi]