Abstract is missing.
- Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive HashingThijs Laarhoven. 3-22 [doi]
- Coded-BKW: Solving LWE Using Lattice CodesQian Guo, Thomas Johansson, Paul Stankovski. 23-42 [doi]
- An Improved BKW Algorithm for LWE with Applications to Cryptography and LatticesPaul Kirchner, Pierre-Alain Fouque. 43-62 [doi]
- Provably Weak Instances of Ring-LWEYara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange. 63-92 [doi]
- Links Among Impossible Differential, Integral and Zero Correlation Linear CryptanalysisBing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda AlKhzaimi, Chao Li. 95-115 [doi]
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or StructureAlex Biryukov, Léo Perrin. 116-140 [doi]
- Capacity and Data Complexity in Multidimensional Linear AttackJialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg. 141-160 [doi]
- Observations on the SIMON Block Cipher FamilyStefan Kölbl, Gregor Leander, Tyge Tiessen. 161-185 [doi]
- Tweaking Even-Mansour CiphersBenoit Cogliati, Rodolphe Lampe, Yannick Seurin. 189-208 [doi]
- Multi-key Security: The Even-Mansour Construction RevisitedNicky Mouha, Atul Luykx. 209-223 [doi]
- Reproducible Circularly-Secure Bit Encryption: Applications and RealizationsMohammad Hajiabadi, Bruce M. Kapron. 224-243 [doi]
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their LimitationsJean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova 0001, Amit Sahai, Mehdi Tibouchi. 247-266 [doi]
- New Multilinear Maps Over the IntegersJean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi. 267-286 [doi]
- Constant-Round Concurrent Zero-Knowledge from Indistinguishability ObfuscationKai-Min Chung, Huijia Lin, Rafael Pass. 287-307 [doi]
- Indistinguishability Obfuscation from Compact Functional EncryptionPrabhanjan Ananth, Abhishek Jain. 308-326 [doi]
- Efficient Pseudorandom Functions via On-the-Fly AdaptationNico Döttling, Dominique Schröder. 329-350 [doi]
- The Iterated Random Permutation Problem with Applications to Cascade EncryptionBrice Minaud, Yannick Seurin. 351-367 [doi]
- The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBCPeter Gazi, Krzysztof Pietrzak, Stefano Tessaro. 368-387 [doi]
- An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key SecurityMichel Abdalla, Fabrice Benhamouda, Alain Passelègue. 388-409 [doi]
- Integral Cryptanalysis on Full MISTY1Yosuke Todo. 413-432 [doi]
- New Attacks on Feistel Structures with Improved Memory ComplexitiesItai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. 433-454 [doi]
- Known-Key Distinguisher on Full PRESENTCéline Blondeau, Thomas Peyrin, Lei Wang. 455-474 [doi]
- Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-BoxesHenri Gilbert, Jérôme Plût, Joana Treger. 475-490 [doi]
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-ResistanceViet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár. 493-517 [doi]
- Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and MoreAvradip Mandal, Arnab Roy. 518-537 [doi]
- Explicit Non-malleable Codes Against Bit-Wise Tampering and PermutationsShashank Agrawal, Divya Gupta 0001, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran. 538-557 [doi]
- Cryptanalysis of the Co-ACD AssumptionPierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi. 561-580 [doi]
- Last Fall Degree, HFE, and Weil Descent Attacks on ECDLPMing-Deh A. Huang, Michiel Kosters, Sze-Ling Yeo. 581-600 [doi]
- A Quasipolynomial Reduction for Generalized Selective Decryption on TreesGeorg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak. 601-620 [doi]
- Practical Free-Start Collision Attacks on 76-step SHA-1Pierre Karpman, Thomas Peyrin, Marc Stevens. 623-642 [doi]
- Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0Bin Zhang, Chao Xu, Willi Meier. 643-662 [doi]
- Cryptanalysis of Full SproutVirginie Lallemand, María Naya-Plasencia. 663-682 [doi]
- Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKEThomas Espitau, Pierre-Alain Fouque, Pierre Karpman. 683-701 [doi]
- Decaf: Eliminating Cofactors Through Point CompressionMike Hamburg. 705-723 [doi]
- Actively Secure OT Extension with Optimal OverheadMarcel Keller, Emmanuela Orsini, Peter Scholl. 724-741 [doi]
- Algebraic Decomposition for Probing SecurityClaude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche. 742-763 [doi]
- Consolidating Masking SchemesOscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede. 764-783 [doi]