Abstract is missing.
- Choosing Parameters for NTRUEncryptJeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang. 3-18 [doi]
- Encoding-Free ElGamal-Type Encryption Schemes on Elliptic CurvesMarc Joye, Benoît Libert. 19-35 [doi]
- Gauss Sieve Algorithm on GPUsShang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, Chen-Mou Cheng. 39-57 [doi]
- A Tool Kit for Partial Key Exposure Attacks on RSAAtsushi Takayasu, Noboru Kunihiro. 58-73 [doi]
- Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding SchemeJakub Breier, Xiaolu Hou. 77-94 [doi]
- An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection OrderHannes Gross, Stefan Mangard, Thomas Korak. 95-112 [doi]
- Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block CiphersPraveen Kumar Vadnala. 115-130 [doi]
- Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable HardwarePascal Sasdrich, Amir Moradi 0001, Tim Güneysu. 131-146 [doi]
- Surnaming Schemes, Fast Verification, and Applications to SGX TechnologyDan Boneh, Shay Gueron. 149-164 [doi]
- On the Entropy of Oscillator-Based True Random Number GeneratorsYuan Ma, Jingqiang Lin, Jiwu Jing. 165-180 [doi]
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldJintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook. 183-204 [doi]
- Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BCChristoph Dobraunig, Eik List. 207-222 [doi]
- Weak Keys for AEZ, and the External Key Padding AttackBart Mennink. 223-237 [doi]
- Full Disk Encryption: Bridging Theory and PracticeLouiza Khati, Nicky Mouha, Damien Vergnaud. 241-257 [doi]
- Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated EncryptionEik List, Mridul Nandi. 258-274 [doi]
- Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in BitcoinRen Zhang, Bart Preneel. 277-292 [doi]
- WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour ConstructionJihoon Cho, Kyu Young Choi, Itai Dinur, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg. 293-308 [doi]
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel AttacksLiron David, Avishai Wool. 311-327 [doi]
- Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog NoiseNoboru Kunihiro, Yuki Takahashi. 328-343 [doi]
- Ridge-Based Profiled Differential Power AnalysisWeijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang. 347-362 [doi]
- My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key GuessesSi Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma. 363-378 [doi]
- Actively Secure 1-out-of-N OT Extension with Application to Private Set IntersectionMichele Orrù, Emmanuela Orsini, Peter Scholl. 381-396 [doi]
- Low-Leakage Secure Search for Boolean ExpressionsFernando Krell, Gabriela Ciocarlie, Ashish Gehani, Mariana Raykova 0001. 397-413 [doi]
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext AttacksDingding Jia, Xianhui Lu, Bao Li. 417-431 [doi]
- New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public ParametersYohei Watanabe 0001, Keita Emura, Jae Hong Seo. 432-449 [doi]