Abstract is missing.
- Breaking Ed25519 in WolfSSLNiels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella. 1-20 [doi]
- MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGXAhmad Moghimi, Thomas Eisenbarth, Berk Sunar. 21-44 [doi]
- Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL UsabilityMartin Ukrop, Vashek Matyas. 45-64 [doi]
- Improved Factorization of N=p^rq^sJean-Sébastien Coron, Rina Zeitoun. 65-79 [doi]
- Cryptanalysis of Compact-LWEJonathan Bootle, Mehdi Tibouchi, Keita Xagawa. 80-97 [doi]
- Two-Message Key Exchange with Strong Security from Ideal LatticesZheng Yang, Yu Chen 0003, Song Luo. 98-115 [doi]
- High-Precision Arithmetic in Homomorphic EncryptionHao Chen, Kim Laine, Rachel Player, Yuhou Xia. 116-136 [doi]
- Threshold Properties of Prime Power Subgroups with Application to Secure Integer ComparisonsRhys Carlton, Aleksander Essex, Krzysztof Kapulkin. 137-156 [doi]
- Practical Revocation and Key RotationSteven Myers, Adam Shull. 157-178 [doi]
- Asynchronous Provably-Secure Hidden ServicesPhilippe Camacho, Fernando Krell. 179-197 [doi]
- Cryptanalysis Against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum ComputationsAkinori Hosoyamada, Yu Sasaki. 198-218 [doi]
- Improving Stateless Hash-Based SignaturesJean-Philippe Aumasson, Guillaume Endignoux. 219-242 [doi]
- MixColumns Properties and Attacks on (Round-Reduced) AES with a Single Secret S-BoxLorenzo Grassi 0001. 243-263 [doi]
- Count-then-Permute: A Precision-Free Alternative to Inversion SamplingKazuhiko Minematsu, Kentarou Sasaki, Yuki Tanaka. 264-278 [doi]
- Zero-Sum Partitions of PHOTON PermutationsQingju Wang, Lorenzo Grassi 0001, Christian Rechberger. 279-299 [doi]
- Improved Security Bound of LightMAC_Plus and Its Single-Key VariantYusuke Naito 0001. 300-318 [doi]
- Reassessing Security of Randomizable SignaturesDavid Pointcheval, Olivier Sanders. 319-338 [doi]
- Differential Attacks on Deterministic SignaturesChristopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, Bruce Murray. 339-353 [doi]
- Composable and Robust Outsourced StorageChristian Badertscher, Ueli Maurer. 354-373 [doi]
- Secure Deduplication of Encrypted Data: Refined Model and New ConstructionsJian Liu, Li Duan, Yong Li, N. Asokan. 374-393 [doi]
- Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks RevisitedDaniel P. Martin 0001, Luke Mather, Elisabeth Oswald. 394-412 [doi]
- High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And an Improved ConstructionFlorian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl. 413-434 [doi]
- Revocable Identity-Based Encryption from Codes with Rank MetricDonghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya. 435-451 [doi]
- An Exposure Model for Supersingular Isogeny Diffie-Hellman Key ExchangeBrian Koziel, Reza Azarderakhsh, David Jao. 452-469 [doi]
- Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation SystemsJohannes Blömer, Fabian Eidens, Jakob Juhnke. 470-490 [doi]
- Regularly Lossy Functions and ApplicationsYu Chen 0003, Baodong Qin, Haiyang Xue. 491-511 [doi]