Abstract is missing.
- Generic Attack on Iterated Tweakable FX ConstructionsFerdinand Sibleyras. 1-14 [doi]
- Universal Forgery Attack Against GCM-RUPYanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang 0035, Guoyan Zhang, Yu Liu. 15-34 [doi]
- My Gadget Just Cares for Me - How NINA Can Prove Security Against Combined AttacksSiemen Dhooghe, Svetla Nikova. 35-55 [doi]
- Modeling Memory Faults in Signature and Authenticated Encryption SchemesMarc Fischlin, Felix Günther 0001. 56-84 [doi]
- Cryptanalysis of the Multivariate Encryption Scheme EFLASHMorten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid. 85-105 [doi]
- FPL: White-Box Secure Block Cipher Using Parallel Table Look-UpsJihoon Kwon, ByeongHak Lee, Jooyoung Lee, Dukjae Moon. 106-128 [doi]
- Extending NIST's CAVP Testing of Cryptographic Hash Function ImplementationsNicky Mouha, Christopher Celi. 129-145 [doi]
- A Fast Characterization Method for Semi-invasive Fault Injection AttacksLichao Wu, Gerard Ribera, Noemie Beringuier-Boher, Stjepan Picek. 146-170 [doi]
- Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK ModelYuting Xiao, Rui Zhang 0002, Hui Ma 0002. 171-198 [doi]
- Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward SecrecyGildas Avoine, Sébastien Canard, Loïc Ferreira. 199-224 [doi]
- TMPS: Ticket-Mediated Password StrengtheningJohn Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sönmez Turan. 225-253 [doi]
- Overdrive2k: Efficient Secure MPC over $\mathbb {Z}_{2^k}$ from Somewhat Homomorphic EncryptionEmmanuela Orsini, Nigel P. Smart, Frederik Vercauteren. 254-283 [doi]
- SoK: A Consensus Taxonomy in the Blockchain EraJuan A. Garay, Aggelos Kiayias. 284-318 [doi]
- Consensus from Signatures of WorkJuan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos. 319-344 [doi]
- Faster Homomorphic Encryption is not Enough: Improved Heuristic for Multiplicative Depth Minimization of Boolean CircuitsPascal Aubry, Sergiu Carpov, Renaud Sirdey. 345-363 [doi]
- Better Bootstrapping for Approximate Homomorphic EncryptionKyoohyung Han, Dohyeong Ki. 364-390 [doi]
- Improved Secure Integer Comparison via Homomorphic EncryptionFlorian Bourse, Olivier Sanders, Jacques Traoré. 391-416 [doi]
- Efficient FPGA Implementations of LowMC and PicnicDaniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner. 417-441 [doi]
- Traceable Ring Signatures with Post-quantum SecurityHanwen Feng, Jianwei Liu, Qianhong Wu, Ya-nan Li. 442-468 [doi]
- Post-quantum Provably-Secure Authentication and MAC from Mersenne PrimesHouda Ferradi, Keita Xagawa. 469-495 [doi]
- Another Look at Some Isogeny Hardness AssumptionsSimon-Philipp Merz, Romy Minko, Christophe Petit. 496-511 [doi]
- How to Construct CSIDH on Edwards CurvesTomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi. 512-537 [doi]
- Policy-Based Sanitizable SignaturesKai Samelin, Daniel Slamanig. 538-563 [doi]
- Traceable Inner Product Functional EncryptionXuan Thanh Do, Duong Hieu Phan, David Pointcheval. 564-585 [doi]
- One-More Assumptions Do Not Help Fiat-Shamir-type Signature Schemes in NPROMMasayuki Fukumitsu, Shingo Hasegawa. 586-609 [doi]
- Cut-and-Choose for Garbled RAMPeihan Miao. 610-637 [doi]
- Universally Composable AccumulatorsFoteini Baldimtsi, Ran Canetti, Sophia Yakoubov. 638-666 [doi]
- A Non-interactive Shuffle Argument with Low Trust AssumptionsAntonis Aggelakis, Prastudy Fauzi, Georgios Korfiatis, Panos Louridas, Foteinos Mergoupis-Anagnou, Janno Siim, Michal Zajac 0001. 667-692 [doi]