Abstract is missing.
- Cryptanalysis of the Multilinear Map over the IntegersJung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehlé. 3-12 [doi]
- Robust Authenticated-Encryption AEZ and the Problem That It SolvesViet Tung Hoang, Ted Krovetz, Phillip Rogaway. 15-44 [doi]
- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear AttacksAnne Canteaut, Joëlle Roué. 45-74 [doi]
- A Provable-Security Analysis of Intel's Secure Key RNGThomas Shrimpton, R. Seth Terashima. 77-100 [doi]
- A Formal Treatment of Backdoored Pseudorandom GeneratorsYevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart. 101-126 [doi]
- Improving NFS for the Discrete Logarithm Problem in Non-prime Finite FieldsRazvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain. 129-155 [doi]
- The Multiple Number Field Sieve with Conjugation and Generalized Joux-Lercier MethodsCécile Pierrot. 156-170 [doi]
- Better Algorithms for LWE and LWRAlexandre Duc, Florian Tramèr, Serge Vaudenay. 173-202 [doi]
- On Computing Nearest Neighbors with Applications to Decoding of Binary Linear CodesAlexander May 0001, Ilya Ozerov. 203-228 [doi]
- Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDEItai Dinur. 231-253 [doi]
- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and ZorroGregor Leander, Brice Minaud, Sondre Rønjom. 254-283 [doi]
- Structural Evaluation by Generalized Integral PropertyYosuke Todo. 287-314 [doi]
- Cryptanalysis of SP Networks with Partial Non-Linear LayersAchiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban. 315-342 [doi]
- The Sum Can Be Weaker Than Each PartGaëtan Leurent, Lei Wang. 345-367 [doi]
- SPHINCS: Practical Stateless Hash-Based SignaturesDaniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, Zooko Wilcox-O'Hearn. 368-397 [doi]
- Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking DeviceAlexandre Duc, Sebastian Faust, François-Xavier Standaert. 401-429 [doi]
- Ciphers for MPC and FHEMartin R. Albrecht, Christian Rechberger, Thomas Schneider 0003, Tyge Tiessen, Michael Zohner. 430-454 [doi]
- Verified Proofs of Higher-Order MaskingGilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub. 457-485 [doi]
- Inner Product Masking RevisitedJosep Balasch, Sebastian Faust, Benedikt Gierlichs. 486-510 [doi]
- Fully Homomophic Encryption over the Integers RevisitedJung Hee Cheon, Damien Stehlé. 513-536 [doi]
- (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message SpacesKoji Nuida, Kaoru Kurosawa. 537-555 [doi]
- KDM-CCA Security from RKA Secure Authenticated EncryptionXianhui Lu, Bao Li, Dingding Jia. 559-583 [doi]
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key AttacksBenoit Cogliati, Yannick Seurin. 584-613 [doi]
- FHEW: Bootstrapping Homomorphic Encryption in Less Than a SecondLéo Ducas, Daniele Micciancio. 617-640 [doi]
- Bootstrapping for HElibShai Halevi, Victor Shoup. 641-670 [doi]
- More Efficient Oblivious Transfer Extensions with Security for Malicious AdversariesGilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner. 673-701 [doi]
- How to Efficiently Evaluate RAM Programs with Malicious SecurityArash Afshar, Zhangxiang Hu, Payman Mohassel, Mike Rosulek. 702-729 [doi]
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge FunctionItai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus. 733-761 [doi]
- Twisted Polynomials and Forgery Attacks on GCMMohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser. 762-786 [doi]
- Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured LatticesVadim Lyubashevsky, Thomas Prest. 789-815 [doi]