Abstract is missing.
- Just a Little Bit MoreJoop van de Pol, Nigel P. Smart, Yuval Yarom. 3-21 [doi]
- Cache Storage AttacksBilly Bob Brumley. 22-34 [doi]
- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRowsChristof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger. 37-58 [doi]
- Improved Attacks on Reduced-Round Camellia-128/192/256Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang. 59-83 [doi]
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsNuttapong Attrapadung, Shota Yamada 0001. 87-105 [doi]
- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short CiphertextsJae Hong Seo, Keita Emura. 106-123 [doi]
- Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other PrimitivesDavid Derler, Christian Hanser, Daniel Slamanig. 127-144 [doi]
- Non-Interactive Zero-Knowledge Proofs of Non-MembershipOlivier Blazy, Céline Chevalier, Damien Vergnaud. 145-164 [doi]
- Implementing GCM on ARMv8Conrado Porto Lopes Gouvêa, Julio López Hernandez. 167-180 [doi]
- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEONJunwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu. 181-198 [doi]
- Completeness of Single-Bit Projection-KDM Security for Public Key EncryptionFuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka. 201-219 [doi]
- Format Oracles on OpenPGPFlorian Maury, Jean-René Reinhard, Olivier Levillain, Henri Gilbert. 220-236 [doi]
- Finding Shortest Lattice Vectors in the Presence of GapsWei Wei, Mingjie Liu, Xiaoyun Wang. 239-257 [doi]
- A Simple and Improved Algorithm for Integer Factorization with Implicit HintsKoji Nuida, Naoto Itakura, Kaoru Kurosawa. 258-269 [doi]
- Hash Functions from Defective Ideal CiphersJonathan Katz, Stefan Lucks, Aishwarya Thiruvengadam. 273-290 [doi]
- Using an Error-Correction Code for Fast, Beyond-Birthday-Bound AuthenticationYusi Zhang. 291-307 [doi]
- Efficient Leakage Resilient Circuit CompilersMarcin Andrychowicz, Ivan Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou. 311-329 [doi]
- Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party ComputationHandan Kilinç, Alptekin Küpçü. 330-349 [doi]
- How to Incorporate Associated Data in Sponge-Based Authenticated EncryptionYu Sasaki, Kan Yasuda. 353-370 [doi]
- Cryptanalysis of AsconChristoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer. 371-387 [doi]
- Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient ConstructionsEssam Ghadafi. 391-409 [doi]
- Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-EncryptionSatsuya Ohata, Yutaka Kawai, Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura. 410-428 [doi]
- Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single TraceNeil Hanley, Heeseok Kim, Michael Tunstall. 431-448 [doi]
- Cold Boot Attacks in the Discrete Logarithm SettingBertram Poettering, Dale L. Sibborn. 449-465 [doi]
- Communication Optimal Tardos-Based Asymmetric FingerprintingAggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang. 469-486 [doi]
- Linearly Homomorphic Encryption from $$\mathsf {DDH}$$Guilhem Castagnos, Fabien Laguillaumie. 487-505 [doi]