Abstract is missing.
- Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller CodesKonstantinos Limniotis, Nicholas Kolokotronis. 3-16 [doi]
- Results on Characterizations of Plateaued Functions in Arbitrary CharacteristicSihem Mesnager, Ferruh Özbudak, Ahmet Sinak. 17-30 [doi]
- Cryptographically Strong S-Boxes Generated by Modified Immune AlgorithmGeorgi Ivanov, Nikolay Nikolov, Svetla Nikova. 31-42 [doi]
- Analysis of the Authenticated Cipher MORUS (v1)Aleksandra Mileva, Vesna Dimitrova, Vesselin Velichkov. 45-59 [doi]
- Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxesYuri L. Borissov, Peter Boyvalenkov, Robert Tsenkov. 60-78 [doi]
- Time-Advantage Ratios Under Simple Transformations: Applications in CryptographyMaciej Skórski. 79-91 [doi]
- Synchronous Universally Composable Computer NetworksDirk Achenbach, Jörn Müller-Quade, Jochen Rill. 95-111 [doi]
- Key-Policy Attribute-Based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear MapsConstantin Catalin Dragan, Ferucio Laurentiu Tiplea. 112-133 [doi]
- Closing the Gap: A Universal Privacy Framework for Outsourced DataDirk Achenbach, Matthias Huber, Jörn Müller-Quade, Jochen Rill. 134-151 [doi]
- On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDASedat Akleylek, Özgür Dagdelen, Zaliha Yüce Tok. 155-168 [doi]
- cuHE: A Homomorphic Encryption Accelerator LibraryWei Dai, Berk Sunar. 169-186 [doi]
- Extended Functionality in Verifiable Searchable EncryptionJames Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick. 187-205 [doi]