Abstract is missing.
- Faster Privacy-Preserving Location Proximity SchemesKimmo Järvinen 0001, Ágnes Kiss, Thomas Schneider 0003, Oleksandr Tkachenko, Zheng Yang. 3-22 [doi]
- Computing Betweenness Centrality: An Efficient Privacy-Preserving ApproachVarsha Bhat Kukkala, S. R. S. Iyengar. 23-42 [doi]
- \mathsf HIKE : Walking the Privacy TrailElena Pagnin, Carlo Brunetta, Pablo Picazo-Sanchez. 43-66 [doi]
- DNS-DNS: DNS-Based De-NAT SchemeLiran Orevi, Amir Herzberg, Haim Zlatokrilov. 69-88 [doi]
- CLEF: Limiting the Damage Caused by Large Flows in the Internet CoreHao Wu 0018, Hsu-Chun Hsiao, Daniele Enrico Asoni, Simon Scherrer, Adrian Perrig, Yih-Chun Hu. 89-108 [doi]
- Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Processing PipelineDonald Nokam Kuate, Sébastien Canard, Renaud Sirdey. 109-129 [doi]
- Malware Tolerant (Mesh-)NetworksMichael Denzel, Mark Dermot Ryan. 133-153 [doi]
- Inside GandCrab RansomwareYassine Lemmou, El Mamoun Souidi. 154-174 [doi]
- The Relation Between CENC and NEMOBart Mennink. 177-189 [doi]
- On the Efficiency of ZMAC-Type ModesYusuke Naito 0001. 190-210 [doi]
- Hierarchical Attribute-Based SignaturesConstantin Catalin Dragan, Daniel Gardham, Mark Manulis. 213-234 [doi]
- Enhanced Security of Attribute-Based SignaturesJohannes Blömer, Fabian Eidens, Jakob Juhnke. 235-255 [doi]
- Protean Signature SchemesStephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig. 256-276 [doi]
- Code-Based Signature Schemes from Identification Protocols in the Rank MetricEmanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Víctor Mateu. 277-298 [doi]
- SETLA: Signature and Encryption from LatticesFrançois Gérard, Keno Merckx. 299-320 [doi]
- Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC CodesPaolo Santini, Marco Baldi, Franco Chiaraluce. 323-343 [doi]
- Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC ProjectZhen Liu, Yanbin Pan, Tianyuan Xie. 344-356 [doi]
- Solving LWR via BDD Strategy: Modulus Switching ApproachHuy Quoc Le, Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda. 357-376 [doi]
- Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its LimitationMomonari Kudo, Yuki Yokota, Yasushi Takahashi, Masaya Yasuda. 377-393 [doi]
- Several MILP-Aided Attacks Against SNOW 2.0Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii. 394-413 [doi]
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionMasahito Ishizaka, Kanta Matsuura. 417-439 [doi]
- Adaptive-Secure VRFs with Shorter Keys from Static AssumptionsRazvan Rosie. 440-459 [doi]
- Secret Sharing Schemes for (k, n)-Consecutive Access StructuresJavier Herranz, Germán Sáez. 463-480 [doi]
- Extending a Framework for Biometric Visual CryptographyKoray Karabina, Angela Robinson. 481-494 [doi]
- Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key FrameworkKamalesh Acharya, Ratna Dutta. 495-515 [doi]