Abstract is missing.
- Approximate Trapdoors for Lattices and Smaller Hash-and-Sign SignaturesYilei Chen, Nicholas Genise, Pratyay Mukherjee. 3-32 [doi]
- Decisional Second-Preimage Resistance: When Does SPR Imply PRE?Daniel J. Bernstein, Andreas Hülsing. 33-62 [doi]
- Structure-Preserving Signatures on Equivalence Classes from Standard AssumptionsMojtaba Khalili, Daniel Slamanig, Mohammad Dakhilalian. 63-93 [doi]
- Simple and Efficient KDM-CCA Secure Public Key EncryptionFuyuki Kitagawa, Takahiro Matsuda 0002, Keisuke Tanaka. 97-127 [doi]
- Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH ProblemYusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka. 128-158 [doi]
- Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its ApplicationsAntonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols. 159-190 [doi]
- iUC: Flexible Universal Composability Made SimpleJan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch 0001. 191-221 [doi]
- Leakage Resilience of the Duplex ConstructionChristoph Dobraunig, Bart Mennink. 225-255 [doi]
- A Critical Analysis of ISO 17825 ('Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules')Carolyn Whitnall, Elisabeth Oswald. 256-284 [doi]
- Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel LeakagesChristos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino. 285-314 [doi]
- Simple Refreshing in the Noisy Leakage ModelStefan Dziembowski, Sebastian Faust, Karol Zebrowski. 315-344 [doi]
- The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen PlaintextsNavid Ghaedi Bardeh, Sondre Rønjom. 347-370 [doi]
- Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMCMartin R. Albrecht, Carlos Cid, Lorenzo Grassi 0001, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger. 371-397 [doi]
- MILP-aided Method of Searching Division Property Using Three Subsets and ApplicationsSenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi. 398-427 [doi]
- Cryptanalysis of GSM Encryption in 2G/3G Networks Without Rainbow TablesBin Zhang. 428-456 [doi]
- Tightly Secure Inner Product Functional Encryption: Multi-input and Function-Hiding ConstructionsJunichi Tomida. 459-488 [doi]
- Public-Key Function-Private Hidden Vector Encryption (and More)James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova 0001. 489-519 [doi]
- Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWEBenoît Libert, Radu Titiu. 520-551 [doi]
- From Single-Input to Multi-client Inner-Product Functional EncryptionMichel Abdalla, Fabrice Benhamouda, Romain Gay. 552-582 [doi]
- Rate-1 Trapdoor Functions from the Diffie-Hellman ProblemNico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, Giulio Malavolta. 585-606 [doi]
- The Local Forking Lemma and Its Application to Deterministic EncryptionMihir Bellare, Wei Dai, Lucy Li. 607-636 [doi]
- Fine-Grained Cryptography RevisitedShohei Egashira, Yuyu Wang, Keisuke Tanaka. 637-666 [doi]
- Shorter QA-NIZK and SPS with Tighter SecurityMasayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy 0003, Yuyu Wang. 669-699 [doi]
- Efficient Noninteractive Certification of RSA Moduli and BeyondSharon Goldberg, Leonid Reyzin, Omar Sagga, Foteini Baldimtsi. 700-727 [doi]
- Shorter Pairing-Based Arguments Under Standard AssumptionsAlonso-González, Carla Ràfols. 728-757 [doi]