Abstract is missing.
- Key-Recovery Attacks on ASASABrice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman. 3-27 [doi]
- The Tower Number Field SieveRazvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung. 31-55 [doi]
- On the Impact of Known-Key Attacks on Hash FunctionsBart Mennink, Bart Preneel. 59-84 [doi]
- Generic Security of NMAC and HMAC with Input WhiteningPeter Gazi, Krzysztof Pietrzak, Stefano Tessaro. 85-109 [doi]
- On the Optimality of Non-Linear Computations of Length-Preserving Encryption SchemesMridul Nandi. 113-133 [doi]
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key MixingBenoît Cogliati, Yannick Seurin. 134-158 [doi]
- An Inverse-Free Single-Keyed Tweakable Enciphering SchemeRitam Bhaumik, Mridul Nandi. 159-180 [doi]
- On Black-Box Complexity of Universally Composable Security in the CRS ModelCarmit Hazay, Muthuramakrishnan Venkitasubramaniam. 183-209 [doi]
- Public Verifiability in the Covert Model (Almost) for FreeVladimir Kolesnikov, Alex J. Malozemoff. 210-235 [doi]
- Limits of Extractability Assumptions with Distributional Auxiliary InputElette Boyle, Rafael Pass. 236-261 [doi]
- Composable and Modular Anonymous Credentials: Definitions and Practical ConstructionsJan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss. 262-288 [doi]
- ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?Vincent Grosso, François-Xavier Standaert. 291-312 [doi]
- Counting Keys in Parallel After a Side Channel AttackDaniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam. 313-337 [doi]
- A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis AttacksLiwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo. 338-360 [doi]
- How Secure is AES Under LeakageAndrey Bogdanov, Takanori Isobe. 361-385 [doi]
- A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour CiphersChun Guo, Dongdai Lin. 389-410 [doi]
- Midori: A Block Cipher for Low EnergySubhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni. 411-436 [doi]
- Optimally Secure Block Ciphers from Ideal PrimitivesStefano Tessaro. 437-462 [doi]
- Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated EncryptionBart Mennink, Reza Reyhanitabar, Damian Vizár. 465-489 [doi]
- Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR CandidatesChristoph Dobraunig, Maria Eichlseder, Florian Mendel. 490-509 [doi]
- Collision Attacks Against CAESAR Candidates - Forgery and Key-Recovery Against AEZ and MarbleThomas Fuhr, Gaëtan Leurent, Valentin Suder. 510-532 [doi]
- Optimized Interpolation Attacks on LowMCItai Dinur, Yunwen Liu, Willi Meier, Qingju Wang. 535-560 [doi]
- Another Tradeoff Attack on Sprout-Like Stream CiphersBin Zhang, Xinxin Gong. 561-585 [doi]
- Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-MalwareMax Fillinger, Marc Stevens. 586-611 [doi]
- Analysis of SHA-512/224 and SHA-512/256Christoph Dobraunig, Maria Eichlseder, Florian Mendel. 612-630 [doi]
- Tradeoff Cryptanalysis of Memory-Hard FunctionsAlex Biryukov, Dmitry Khovratovich. 633-657 [doi]
- Property Preserving Symmetric Encryption RevisitedSanjit Chatterjee, M. Prem Laxman Das. 658-682 [doi]
- Refinements of the k-tree Algorithm for the Generalized Birthday ProblemIvica Nikolic, Yu Sasaki. 683-703 [doi]
- How to Sequentialize Independent Parallel Attacks? - Biased Distributions Have a Phase TransitionSonia Bogos, Serge Vaudenay. 704-731 [doi]
- Pure Differential Privacy for Rectangle Queries via Private PartitionsCynthia Dwork, Moni Naor, Omer Reingold, Guy N. Rothblum. 735-751 [doi]
- Implementing Candidate Graded Encoding Schemes from Ideal LatticesMartin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois. 752-775 [doi]
- New Circular Security Counterexamples from Decision Linear and Learning with ErrorsAllison Bishop, Susan Hohenberger, Brent Waters. 776-800 [doi]