Abstract is missing.
- A General Framework for Redactable Signatures and New ConstructionsDavid Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig. 3-19 [doi]
- On the Security of the Schnorr Signature Scheme and DSA Against Related-Key AttacksHiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda 0002, Goichiro Hanaoka, Tetsu Iwata. 20-35 [doi]
- Attribute-Based Two-Tier Signatures: Definition and ConstructionHiroaki Anada, Seiko Arita, Kouichi Sakurai. 36-49 [doi]
- Ciphertext-Policy Attribute-Based Broadcast Encryption with Small KeysBenjamin Wesolowski, Pascal Junod. 53-68 [doi]
- Learning with Errors in the ExponentÖzgür Dagdelen, Sebastian Gajek, Florian Göpfert. 69-84 [doi]
- Higher-Order Cryptanalysis of LowMCChristoph Dobraunig, Maria Eichlseder, Florian Mendel. 87-101 [doi]
- Integral Attack Against Bit-Oriented Block CiphersHuiling Zhang, Wenling Wu, Yanfeng Wang. 102-118 [doi]
- Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya. 119-135 [doi]
- Improved Impossible Differential Attack on Reduced-Round LBlockNing Wang, Xiaoyun Wang, Keting Jia. 136-152 [doi]
- Point Decomposition Problem in Binary Elliptic CurvesKoray Karabina. 155-168 [doi]
- Faster ECC over \mathbb F_2^521-1 F 2 521 - 1 (feat. NEON)Hwajeong Seo, Zhe Liu 0001, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim. 169-181 [doi]
- On the (In)Efficiency of Non-Interactive Secure Multiparty ComputationMaki Yoshida, Satoshi Obana. 185-193 [doi]
- Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden TweaksDonghoon Chang, Amit Kumar Chauhan, Muhammed Noufal K, Jinkeon Kang. 194-209 [doi]
- On Differentially Private Online Collaborative Recommendation SystemsSeth Gilbert, Xiao Liu, Haifeng Yu. 210-226 [doi]
- Stack Layout Randomization with Minimal Rewriting of Android BinariesYu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang. 229-245 [doi]
- Improving Fuzzing Using Software Complexity MetricsMaksim O. Shudrak, Vyacheslav V. Zolotarev. 246-261 [doi]
- Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based DetectorJulian Vetter, Matthias Junker-Petschick, Jan C. Nordholz, Michael Peter, Janis Danisevskis. 262-277 [doi]
- Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty DetectionJiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto. 278-293 [doi]
- Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF AlgorithmWeiqiong Cao, Jingyi Feng, Hua Chen, Shaofeng Zhu, Wenling Wu, Xucang Han, Xiaoguang Zheng. 297-313 [doi]
- Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key SchedulesTomoyuki Tanigaki, Noboru Kunihiro. 314-328 [doi]
- New Efficient Padding Methods Secure Against Padding Oracle AttacksHyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong. 329-342 [doi]
- Let Me Prove It to You: RO PUFs Are Provably LearnableFatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert. 345-358 [doi]
- Anonymous Authentication Scheme Based on PUFLukasz Krzywiecki. 359-372 [doi]