Abstract is missing.
- Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 SecondsIlaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène. 3-33 [doi]
- A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve AlgorithmPalash Sarkar, Shashank Singh 0001. 37-62 [doi]
- On the Security of Supersingular Isogeny CryptosystemsSteven D. Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti. 63-91 [doi]
- Simpira v2: A Family of Efficient Permutations Using the AES Round FunctionShay Gueron, Nicky Mouha. 95-125 [doi]
- Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space HardnessAndrey Bogdanov, Takanori Isobe, Elmar Tischhauser. 126-158 [doi]
- Efficient and Provable White-Box PrimitivesPierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud. 159-188 [doi]
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityMartin R. Albrecht, Lorenzo Grassi 0001, Christian Rechberger, Arnab Roy 0005, Tyge Tiessen. 191-219 [doi]
- Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential AttacksDan Boneh, Henry Corrigan-Gibbs, Stuart E. Schechter. 220-248 [doi]
- Linear Structures: Applications to Cryptanalysis of Round-Reduced KeccakJian Guo 0001, Meicheng Liu, Ling Song. 249-274 [doi]
- When Are Fuzzy Extractors Possible?Benjamin Fuller, Leonid Reyzin, Adam D. Smith. 277-306 [doi]
- More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing. 307-329 [doi]
- Trick or Tweak: On the (In)security of OTR's TweaksRaphael Bost, Olivier Sanders. 333-353 [doi]
- Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption AlgorithmAsli Bay, Oguzhan Ersoy, Ferhat Karakoç. 354-368 [doi]
- Statistical Fault Attacks on Nonce-Based Authenticated Encryption SchemesChristoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel. 369-395 [doi]
- Authenticated Encryption with Variable StretchReza Reyhanitabar, Serge Vaudenay, Damian Vizár. 396-425 [doi]
- Salvaging Weak Security Bounds for Blockcipher-Based ConstructionsThomas Shrimpton, R. Seth Terashima. 429-454 [doi]
- How to Build Fully Secure Tweakable Blockciphers from Classical BlockciphersLei Wang, Jian Guo 0001, Guoyan Zhang, Jingyuan Zhao, Dawu Gu. 455-483 [doi]
- Design Strategies for ARX with Provable Bounds: Sparx and LAXDaniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov. 484-513 [doi]
- Side-Channel Analysis Protection and Low-Latency in Action - - Case Study of PRINCE and Midori -Amir Moradi 0001, Tobias Schneider. 517-547 [doi]
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel EvaluationsDaniel P. Martin 0001, Luke Mather, Elisabeth Oswald, Martijn Stam. 548-572 [doi]
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled ImplementationsNicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul, François-Xavier Standaert, Yannick Teglia. 573-601 [doi]
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRFMarcel Medwed, François-Xavier Standaert, Ventzislav Nikov, Martin Feldhofer. 602-623 [doi]
- A New Algorithm for the Unbalanced Meet-in-the-Middle ProblemIvica Nikolic, Yu Sasaki. 627-647 [doi]
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block CiphersZejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin. 648-678 [doi]
- Reverse Cycle Walking and Its ApplicationsSarah Miracle, Scott Yilek. 679-700 [doi]
- Optimization of \mathsf LPN Solving AlgorithmsSonia Bogos, Serge Vaudenay. 703-728 [doi]
- The Kernel Matrix Diffie-Hellman AssumptionPaz Morillo, Carla Ràfols, Jorge Luis Villar. 729-758 [doi]
- Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate PolynomialsTed Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr. 759-788 [doi]
- A Key Recovery Attack on MDPC with CCA Security Using Decoding ErrorsQian Guo, Thomas Johansson 0001, Paul Stankovski. 789-815 [doi]
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile - and Why It Is NotCong Chen, Mohammad Farmani, Thomas Eisenbarth. 819-843 [doi]
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash FunctionsRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang. 844-876 [doi]
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper ResilienceAntonio Faonio, Daniele Venturi 0001. 877-907 [doi]
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsEiichiro Fujisaki, Keita Xagawa. 908-938 [doi]