Abstract is missing.
- Security of Symmetric Encryption against Mass SurveillanceMihir Bellare, Kenneth G. Paterson, Phillip Rogaway. 1-19 [doi]
- The Security of Multiple Encryption in the Ideal Cipher ModelYuanxi Dai, Jooyoung Lee, Bart Mennink, John P. Steinberger. 20-38 [doi]
- Minimizing the Two-Round Even-Mansour CipherShan Chen, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, John P. Steinberger. 39-56 [doi]
- Block Ciphers - Focus on the Linear Layer (feat. PRIDE)Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçin. 57-76 [doi]
- Related-Key Security for Pseudorandom Functions Beyond the Linear BarrierMichel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson. 77-94 [doi]
- Automated Analysis of Cryptographic Assumptions in Generic Group ModelsGilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt. 95-112 [doi]
- The Exact PRF-Security of NMAC and HMACPeter Gazi, Krzysztof Pietrzak, Michal Rybár. 113-130 [doi]
- Updates on Generic Attacks against HMAC and NMACJian Guo 0001, Thomas Peyrin, Yu Sasaki, Lei Wang. 131-148 [doi]
- Improved Generic Attacks against Hash-Based MACs and HAIFAItai Dinur, Gaëtan Leurent. 149-168 [doi]
- Cryptography from Compression Functions: The UCE Bridge to the ROMMihir Bellare, Viet Tung Hoang, Sriram Keelveedhi. 169-187 [doi]
- Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable SourcesChristina Brzuska, Pooya Farshim, Arno Mittelbach. 188-205 [doi]
- Low Overhead Broadcast Encryption from Multilinear MapsDan Boneh, Brent Waters, Mark Zhandry. 206-223 [doi]
- Security Analysis of Multilinear Maps over the IntegersHyung Tae Lee, Jae Hong Seo. 224-240 [doi]
- Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear GroupsMasayuki Abe, Jens Groth, Miyako Ohkubo, Takeya Tango. 241-260 [doi]
- Polynomial Spaces: A New Framework for Composite-to-Prime-Order TransformationsGottfried Herold, Julia Hesse, Dennis Hofheinz, Carla Ràfols, Andy Rupp. 261-279 [doi]
- Revisiting the Gentry-Szydlo AlgorithmH. W. Lenstra, A. Silverberg. 280-296 [doi]
- Faster Bootstrapping with Polynomial ErrorJacob Alperin-Sheriff, Chris Peikert. 297-314 [doi]
- Hardness of k-LWE and Applications in Traitor TracingSan Ling, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld. 315-334 [doi]
- Improved Short Lattice Signatures in the Standard ModelLéo Ducas, Daniele Micciancio. 335-352 [doi]
- New and Improved Key-Homomorphic Pseudorandom FunctionsAbhishek Banerjee 0001, Chris Peikert. 353-370 [doi]
- Homomorphic Signatures with Efficient Verification for Polynomial FunctionsDario Catalano, Dario Fiore, Bogdan Warinschi. 371-389 [doi]
- Structure-Preserving Signatures from Type II PairingsMasayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi. 390-407 [doi]
- (Hierarchical) Identity-Based Encryption from Affine Message AuthenticationOlivier Blazy, Eike Kiltz, Jiaxin Pan. 408-425 [doi]
- Witness Encryption from Instance Independent AssumptionsCraig Gentry, Allison B. Lewko, Brent Waters. 426-443 [doi]
- RSA Key Extraction via Low-Bandwidth Acoustic CryptanalysisDaniel Genkin, Adi Shamir, Eran Tromer. 444-461 [doi]
- On the Impossibility of Cryptography with Tamperable RandomnessPer Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth. 462-479 [doi]
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability ObfuscationDan Boneh, Mark Zhandry. 480-499 [doi]
- Indistinguishability Obfuscation from Semantically-Secure Multilinear EncodingsRafael Pass, Karn Seth, Sidharth Telang. 500-517 [doi]
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary InputSanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs. 518-535 [doi]
- Maliciously Circuit-Private FHERafail Ostrovsky, Anat Paskin-Cherniavsky, Beni Paskin-Cherniavsky. 536-553 [doi]
- Algorithms in HElibShai Halevi, Victor Shoup. 554-571 [doi]