Abstract is missing.
- New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message LengthYusuke Naito, Kan Yasuda. 3-22 [doi]
- RIV for Robust Authenticated EncryptionFarzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel. 23-42 [doi]
- A MAC Mode for Lightweight Block CiphersAtul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda. 43-59 [doi]
- Cryptanalysis of the Full Spritz Stream CipherSubhadeep Banik, Takanori Isobe. 63-77 [doi]
- Attacks Against Filter Generators Exploiting Monomial MappingsAnne Canteaut, Yann Rotella. 78-98 [doi]
- Lightweight MDS Generalized Circulant MatricesMeicheng Liu, Siang Meng Sim. 101-120 [doi]
- On the Construction of Lightweight Circulant Involutory MDS MatricesYongqiang Li, Mingsheng Wang. 121-139 [doi]
- Optimizing S-Box Implementations for Several Criteria Using SAT SolversKo Stoffelen. 140-160 [doi]
- Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBCJosé Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir. 163-184 [doi]
- White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -Pascal Sasdrich, Amir Moradi 0001, Tim Güneysu. 185-203 [doi]
- Detecting Flawed Masking Schemes with Leakage Detection TestsOscar Reparaz. 204-222 [doi]
- There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel AttacksHoussem Maghrebi, Victor Servant, Julien Bringer. 223-243 [doi]
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINELi Lin, Wenling Wu, Yafei Zheng. 247-267 [doi]
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for SpeckKai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu. 268-288 [doi]
- Automatic Search for the Best Trails in ARX: Application to Block Cipher SpeckAlex Biryukov, Vesselin Velichkov, Yann Le Corre. 289-310 [doi]
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionAnne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey. 313-333 [doi]
- Efficient Design Strategies Based on the AES Round FunctionJérémy Jean, Ivica Nikolic. 334-353 [doi]
- Bit-Based Division Property and Application to Simon FamilyYosuke Todo, Masakatu Morii. 357-377 [doi]
- Algebraic Insights into the Secret Feistel NetworkLéo Perrin, Aleksei Udovenko. 378-398 [doi]
- Integrals Go Statistical: Cryptanalysis of Full Skipjack VariantsMeiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov. 399-415 [doi]
- Note on Impossible Differential AttacksPatrick Derbez. 416-427 [doi]
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing TechniquesHuaifeng Chen, Xiaoyun Wang. 428-449 [doi]
- Modeling Random Oracles Under Unpredictable QueriesPooya Farshim, Arno Mittelbach. 453-473 [doi]
- Practical Order-Revealing Encryption with Limited LeakageNathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu. 474-493 [doi]
- Strengthening the Known-Key Security Notion for Block CiphersBenoît Cogliati, Yannick Seurin. 494-513 [doi]
- Related-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsPeng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng. 514-532 [doi]
- Key Recovery Attack Against 2.5-Round \pi -CipherChristina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder. 535-553 [doi]
- Cryptanalysis of Reduced NORXNasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki. 554-574 [doi]
- Analysis of the Kupyna-256 Hash FunctionChristoph Dobraunig, Maria Eichlseder, Florian Mendel. 575-590 [doi]