Abstract is missing.
- Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code LevelYoussef Souissi, Adrien Facon, Sylvain Guilley. 3-12 [doi]
- Cache-Timing Attacks Still Threaten IoT DevicesSofiane Takarabt, Alexander Schaub 0001, Adrien Facon, Sylvain Guilley, Laurent Sauvage, Youssef Souissi, Yves Mathieu. 13-30 [doi]
- Speed-up of SCA Attacks on 32-bit MultiplicationsRobert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad. 31-39 [doi]
- Arabic Cryptography and Steganography in MoroccoAbdelmalek Azizi. 43-54 [doi]
- An AEAD Variant of the Grain Stream CipherMartin Hell, Thomas Johansson 0001, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida. 55-71 [doi]
- Construction for a Nominative Signature Scheme from Lattice with Enhanced SecurityMeenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay. 72-91 [doi]
- Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNGGeorge Teseleanu. 92-104 [doi]
- A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors ProblemJintai Ding, Kevin Schmitt, Zheng Zhang. 105-117 [doi]
- Non-interactive Zero Knowledge Proofs in the Random Oracle ModelVincenzo Iovino, Ivan Visconti. 118-141 [doi]
- From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard AssumptionsLinru Zhang, Yuechen Chen, Jun Zhang, Meiqi He, Siu-Ming Yiu. 142-167 [doi]
- Efficient Proactive Secret Sharing for Large Data via Concise Vector CommitmentsMatthias Geihs, Lucas Schabhüser, Johannes Buchmann 0001. 171-194 [doi]
- Secret Sharing Using Near-MDS CodesSanyam Mehta, Vishal Saraswat, Smith Sen. 195-214 [doi]
- On Plateaued Functions, Linear Structures and Permutation PolynomialsSihem Mesnager, Kübra Kaytanci, Ferruh Özbudak. 217-235 [doi]
- Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition ChainsHairong Yi, Guiwen Luo, Dongdai Lin. 236-253 [doi]
- On Good Polynomials over Finite Fields for Optimal Locally Recoverable CodesSihem Mesnager. 257-268 [doi]
- A New Gabidulin-Like Code and Its Application in CryptographyTerry Shue Chien Lau, Chik-How Tan. 269-287 [doi]
- Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum \pi -distance 3Soukaina Belabssir, Edoukou Berenger Ayebie, El Mamoun Souidi. 288-306 [doi]
- Quasi-Dyadic Girault Identification SchemeBrice Odilon Boidje, Cheikh Thiecoumba Gueye, Gilbert Ndollane Dione, Jean Belo Klamti. 307-321 [doi]
- Securely Aggregating Testimonies with Threshold Multi-key FHEGérald Gavin, Stéphane Bonnevay. 325-348 [doi]
- Improved Efficiency of a Linearly Homomorphic CryptosystemParthasarathi Das, Michael J. Jacobson Jr., Renate Scheidler. 349-368 [doi]
- On the Tracing Traitors Math - Dedicated to the Memory of Bob Blakley - Pioneer of Digital Fingerprinting and Inventor of Secret SharingGrigory Kabatiansky. 371-380 [doi]
- Reusable Garbled Turing Machines Without FHEYongge Wang, Qutaibah M. Malluhi. 381-398 [doi]
- An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and FairnessJingchen Yan, Yating Wang, Yuichi Goto, Jingde Cheng. 399-408 [doi]
- A Practical and Insider Secure Signcryption with Non-interactive Non-repudiationAugustin P. Sarr, Papa B. Seye, Togdé Ngarenon. 409-429 [doi]
- Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM SystemsSaid El Hajji, Nabil Moukafih, Ghizlane Orhanou. 433-451 [doi]
- Managing Your Kleptographic Subscription PlanGeorge Teseleanu. 452-461 [doi]
- Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete VerificationGianpiero Cabodi, Paolo Camurati, Fabrizio F. Finocchiaro, Danilo Vendraminetto. 462-479 [doi]