Abstract is missing.
- Linear Regression Attack with F-test: A New SCARE Technique for Secret Block CiphersSi Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma. 3-18 [doi]
- Compact Representation for Division PropertyYosuke Todo, Masakatu Morii. 19-35 [doi]
- An Automatic Cryptanalysis of Transposition Ciphers Using CompressionNoor R. Al-Kazaz, Sean A. Irvine, William John Teahan. 36-52 [doi]
- Side-Channel Attacks on Threshold Implementations Using a Glitch AlgebraSerge Vaudenay. 55-70 [doi]
- Diversity Within the Rijndael Design Principles for Resistance to Differential Power AnalysisMerrielle Spain, Mayank Varia. 71-87 [doi]
- NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARMBrian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, Mehran Mozaffari Kermani. 88-103 [doi]
- Server-Aided Revocable Identity-Based Encryption from LatticesKhoa Nguyen, Huaxiong Wang, Juanyang Zhang. 107-123 [doi]
- Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based CryptographyPatrick Longa, Michael Naehrig. 124-139 [doi]
- An Efficient Lattice-Based Multisignature Scheme with Applications to BitcoinsRachid El Bansarkhani, Jan Sturm. 140-155 [doi]
- Breaking PPTP VPNs via RADIUS EncryptionMatthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk. 159-175 [doi]
- LEAP: A Next-Generation Client VPN and Encrypted Email ProviderElijah Sparrow, Harry Halpin, Kali Kaneko, Ruben Pollan. 176-191 [doi]
- Implementation State of HSTS and HPKP in Both Browsers and ServersSergio de los Santos, Carmen Torrano, Yaiza Rubio, Felix Brezo. 192-207 [doi]
- Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data SharingDavid Derler, Stephan Krenn, Daniel Slamanig. 211-227 [doi]
- Group Signature with Deniability: How to Disavow a SignatureAi Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka. 228-244 [doi]
- Sandwich Construction for Keyed Sponges: Independence Between Capacity and Online QueriesYusuke Naito. 245-261 [doi]
- Secure Error-Tolerant Graph Matching ProtocolsKalikinkar Mandal, Basel Alomair, Radha Poovendran. 265-283 [doi]
- Efficient Verifiable Computation of XOR for Biometric AuthenticationAysajan Abidin, Abdelrahaman Aly, Enrique Argones-Rúa, Aikaterini Mitrokotsa. 284-298 [doi]
- Verifiable Message-Locked EncryptionSébastien Canard, Fabien Laguillaumie, Marie Paindavoine. 299-315 [doi]
- Security of Online AE Schemes in RUP SettingJian Zhang, Wen-Ling Wu. 319-334 [doi]
- An Efficient Entity Authentication Protocol with Enhanced Security and Privacy PropertiesAysajan Abidin, Enrique Argones-Rúa, Bart Preneel. 335-349 [doi]
- Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric EncryptionKenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto. 350-364 [doi]
- AAL and Static Conflict Detection in PolicyJean-Claude Royer, Anderson Santana de Oliveira. 367-382 [doi]
- Component-Oriented Access Control for Deployment of Application Services in Containerized EnvironmentsKirill Belyaev, Indrakshi Ray. 383-399 [doi]
- Generic Access Control System for Ad Hoc MCC and Fog ComputingBilel Zaghdoudi, Hella Kaffel Ben Ayed, Wafa Harizi. 400-415 [doi]
- SecReach: Secure Reachability Computation on Encrypted Location Check-in DataHanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang. 419-434 [doi]
- FHE Over the Integers and Modular Arithmetic CircuitsEunkyung Kim, Mehdi Tibouchi. 435-450 [doi]
- An Efficient Somewhat Homomorphic Encryption Scheme Based on FactorizationGérald Gavin. 451-464 [doi]
- Efficient, XOR-Based, Ideal (t, n)- threshold SchemesLiqun Chen, Thalia M. Laing, Keith M. Martin. 467-483 [doi]
- Efficient and Secure Multiparty Computations Using a Standard Deck of Playing CardsTakaaki Mizuki. 484-499 [doi]
- Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private PermutationsTakeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, Kazuo Ohta. 500-517 [doi]
- Evaluation on Malware Classification by Session Sequence of Common ProtocolsShohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama. 521-531 [doi]
- An Efficient Approach to Detect TorrentLocker Ransomware in Computer SystemsFaustin Mbol, Jean-Marc Robert, Alireza Sadighian. 532-541 [doi]
- Detecting Malware Through Anti-analysis Signals - A Preliminary StudyJoash W. J. Tan, Roland H. C. Yap. 542-551 [doi]
- Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping - Secrecy Amplification CaseRadim Ostádal, Petr Svenda, Vashek Matyás. 552-561 [doi]
- Improved Attacks on Extended Generalized Feistel NetworksValérie Nachef, Nicolas Marrière, Emmanuel Volte. 562-572 [doi]
- When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015Thierry Kaufmann, Hervé Pelletier, Serge Vaudenay, Karine Villegas. 573-582 [doi]
- On the Power of Public-key Function-Private Functional EncryptionVincenzo Iovino, Qiang Tang 0001, Karol Zebrowski. 585-593 [doi]
- A New Technique for Compacting Secret Key in Attribute-Based Broadcast EncryptionSébastien Canard, Duong Hieu Phan, Viet Cuong Trinh. 594-603 [doi]
- An Efficient Construction of Non-Interactive Secure Multiparty ComputationSatoshi Obana, Maki Yoshida. 604-614 [doi]
- An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading MarketAysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa. 615-625 [doi]
- Implementation of Verified Set Operation Protocols Based on Bilinear AccumulatorsLuca Ferretti, Michele Colajanni, Mirco Marchetti. 626-636 [doi]
- Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate RepresentationBo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang. 637-647 [doi]
- DNSSEC Misconfigurations in Popular DomainsTianxiang Dai, Haya Shulman, Michael Waidner. 651-660 [doi]
- Integral PrivacyVicenç Torra, Guillermo Navarro-Arribas. 661-669 [doi]
- Sharing Is Caring, or Callous?Yu Pu, Jens Grossklags. 670-680 [doi]
- Improving the Sphinx Mix NetworkFilipe Beato, Kimmo Halunen, Bart Mennink. 681-691 [doi]
- User Authentication from Mouse Movement Data Using SVM ClassifierBashira Akter Anima, Mahmood Jasim, Khandaker Abir Rahman, Adam Rulapaugh, Mohammed Hasanuzzaman. 692-700 [doi]
- Distance Bounding Based on PUFMathilde Igier, Serge Vaudenay. 701-710 [doi]
- Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based ServicesTassos Dimitriou, Naser Al-Ibrahim. 713-718 [doi]
- Range Query Integrity in Cloud Data Streams with Efficient InsertionFrancesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera. 719-724 [doi]
- Vulnerability Analysis Using Google and ShodanKai Simon. 725-730 [doi]
- Language-Based HypervisorsEnrico Budianto, Richard Chow, Jonathan Ding, Michael McCool. 731-736 [doi]
- Internet Censorship in Italy: A First Look at 3G/4G NetworksGiuseppe Aceto, Antonio Montieri, Antonio Pescapè. 737-742 [doi]
- A Privacy-Preserving Model for Biometric FusionChristina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel. 743-748 [doi]
- Hybrid WBC: Secure and Efficient White-Box Encryption SchemesJihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg. 749-754 [doi]
- Moving in Next Door: Network Flooding as a Side Channel in Cloud EnvironmentsYatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, Mayank Varia. 755-760 [doi]