Abstract is missing.
- Structure-Preserving Certificateless Encryption and Its ApplicationTao Zhang 0014, Huangting Wu, Sherman S. M. Chow. 1-22 [doi]
- Public Key Encryption Resilient to Post-challenge Leakage and Tampering AttacksSuvradip Chakraborty, C. Pandu Rangan. 23-43 [doi]
- Downgradable Identity-Based Encryption and ApplicationsOlivier Blazy, Paul Germouty, Duong Hieu Phan. 44-61 [doi]
- Large Universe Subset Predicate Encryption Based on Static Assumption (Without Random Oracle)Sanjit Chatterjee, Sayantan Mukherjee. 62-82 [doi]
- An Improved RNS Variant of the BFV Homomorphic Encryption SchemeShai Halevi, Yuriy Polyakov, Victor Shoup. 83-105 [doi]
- New Techniques for Multi-value Input Homomorphic Evaluation and ApplicationsSergiu Carpov, Malika Izabachène, Victor Mollimard. 106-126 [doi]
- Efficient Function-Hiding Functional Encryption: From Inner-Products to OrthogonalityManuel Barbosa, Dario Catalano, Azam Soleimanian, Bogdan Warinschi. 127-148 [doi]
- Robust Encryption, ExtendedRémi Géraud, David Naccache, Razvan Rosie. 149-168 [doi]
- Tight Reductions for Diffie-Hellman Variants in the Algebraic Group ModelTaiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi. 169-188 [doi]
- Doubly Half-Injective PRGs for Incompressible White-Box CryptographyEstuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels. 189-209 [doi]
- Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party ComputationNigel P. Smart, Tim Wood. 210-229 [doi]
- Lossy Trapdoor Permutations with Improved LossinessBenedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen. 230-250 [doi]
- Post-quantum EPID Signatures from Symmetric PrimitivesDan Boneh, Saba Eskandarian, Ben Fisch. 251-271 [doi]
- Assessment of the Key-Reuse Resilience of NewHopeAurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi. 272-292 [doi]
- Universal Forgery and Multiple Forgeries of MergeMAC and Generalized ConstructionsTetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki. 293-312 [doi]
- Linking Stam's Bounds with Generalized TruncationBart Mennink. 313-329 [doi]
- Poly-Logarithmic Side Channel Rank Estimation via Exponential SamplingLiron David, Avishai Wool. 330-349 [doi]
- Efficient Fully-Leakage Resilient One-More Signature SchemesAntonio Faonio. 350-371 [doi]
- MILP-Based Differential Attack on Round-Reduced GIFTBaoyu Zhu, Xiaoyang Dong, Hongbo Yu. 372-390 [doi]
- Quantum Chosen-Ciphertext Attacks Against Feistel CiphersGembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata. 391-411 [doi]
- Automatic Search for a Variant of Division Property Using Three SubsetsKai Hu, Meiqin Wang. 412-432 [doi]
- Constructing TI-Friendly Substitution Boxes Using Shift-Invariant PermutationsSi Gao, Arnab Roy 0005, Elisabeth Oswald. 433-452 [doi]
- Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural NetworksMark Abspoel, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede. 453-472 [doi]
- EPIC: Efficient Private Image Classification (or: Learning from the Masters)Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren. 473-492 [doi]
- Context Hiding Multi-key Linearly Homomorphic AuthenticatorsLucas Schabhüser, Denis Butin, Johannes Buchmann 0001. 493-513 [doi]
- Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) ComputationLiang Zhao. 514-534 [doi]
- Delegatable Anonymous Credentials from Mercurial SignaturesElizabeth C. Crites, Anna Lysyanskaya. 535-555 [doi]
- Accountable Tracing Signatures from LatticesSan Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu. 556-576 [doi]