Abstract is missing.
- Towards Ideal Self-bilinear MapTakashi Yamakawa. 1 [doi]
- Five-Card AND Protocol in Committed Format Using Only Practical ShufflesYuta Abe, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone. 3-8 [doi]
- SoK: A Performance Evaluation of Cryptographic Instruction Sets on Modern ArchitecturesArmando Faz-Hernández, Julio López, Ana Karina D. S. de Oliveira. 9-18 [doi]
- You Shall Not Pass! (Once Again): An IoT Application of Post-quantum Stateful Signature SchemesEmanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Víctor Mateu. 19-24 [doi]
- A New LRPC-Kronecker Product Codes Based Public-Key CryptographyJon-Lark Kim, Lucky Galvez, Young-Sik Kim, Nari Lee. 25-33 [doi]
- A Note on Subgroup Security in Pairing-Based CryptographyTadanori Teruya. 35-43 [doi]
- On Several Verifiable Random Functions and the q-decisional Bilinear Diffie-Hellman Inversion AssumptionSebastian Lauer. 45-51 [doi]
- SoK: The Problem Landscape of SIDHDavid Urbanik, David Jao. 53-60 [doi]