Abstract is missing.
- Programming the Demirci-Selçuk Meet-in-the-Middle Attack with ConstraintsDanping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu. 3-34 [doi]
- Cryptanalysis of MORUSTomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier. 35-64 [doi]
- New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based ConstructionsLing Song 0001, Jian Guo 0001, Danping Shi, San Ling. 65-95 [doi]
- On the Concrete Security of Goldreich's Pseudorandom GeneratorGeoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella. 96-124 [doi]
- A Framework for Achieving KDM-CCA Secure Public-Key EncryptionFuyuki Kitagawa, Keisuke Tanaka. 127-157 [doi]
- Understanding and Constructing AKE via Double-Key Key Encapsulation MechanismHaiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He. 158-189 [doi]
- Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext AttacksDennis Hofheinz, Dingding Jia, Jiaxin Pan. 190-220 [doi]
- Short Digital Signatures and ID-KEMs via Truncation Collision ResistanceTibor Jager, Rafael Kurek. 221-250 [doi]
- Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle ModelShuichi Katsumata, Shota Yamada 0001, Takashi Yamakawa. 253-282 [doi]
- New Instantiations of the CRYPTO 2017 Masking SchemesPierre Karpman, Daniel S. Roche. 285-314 [doi]
- Statistical Ineffective Fault Attacks on Masked AES with Fault CountermeasuresChristoph Dobraunig, Maria Eichlseder, Hannes Groß, Stefan Mangard, Florian Mendel, Robert Primas. 315-342 [doi]
- Tight Private Circuits: Achieving Probing Security with the Least RefreshingSonia Belaïd, Dahmun Goudarzi, Matthieu Rivain. 343-372 [doi]
- Attacks and Countermeasures for White-box DesignsAlex Biryukov, Aleksei Udovenko. 373-402 [doi]
- Signatures with Flexible Public Key: Introducing Equivalence Classes for Public KeysMichael Backes 0001, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider. 405-434 [doi]
- Compact Multi-signatures for Smaller BlockchainsDan Boneh, Manu Drijvers, Gregory Neven. 435-464 [doi]
- Multi-key Homomorphic Signatures Unforgeable Under Insider CorruptionRussell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow. 465-492 [doi]
- Attribute-Based Signatures for Unbounded Languages from Standard AssumptionsYusuke Sakai 0001, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka. 493-522 [doi]
- Learning Strikes Again: The Case of the DRS Signature SchemeYang Yu, Léo Ducas. 525-543 [doi]
- How to Securely Compute with Noisy Leakage in Quasilinear ComplexityDahmun Goudarzi, Antoine Joux, Matthieu Rivain. 547-574 [doi]
- Leakage-Resilient Cryptography from Puncturable Primitives and ObfuscationYu Chen, Yuyu Wang, Hong-Sheng Zhou. 575-606 [doi]
- Unbounded Inner Product Functional Encryption from Bilinear MapsJunichi Tomida, Katsuyuki Takashima. 609-639 [doi]
- Adaptively Simulation-Secure Attribute-Hiding Predicate EncryptionPratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima. 640-672 [doi]
- Improved Inner-Product Encryption with Adaptive Security and Full Attribute-HidingJie Chen 0021, Junqing Gong, Hoeteck Wee. 673-702 [doi]
- Decentralized Multi-Client Functional Encryption for Inner ProductJérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval. 703-732 [doi]
- Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo pGuilhem Castagnos, Fabien Laguillaumie, Ida Tucker. 733-764 [doi]