Abstract is missing.
- New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based EncryptionTakeshi Koshiba, Katsuyuki Takashima. 3-19 [doi]
- Mitigating the One-Use Restriction in Attribute-Based EncryptionLucas Kowalczyk, Jiahui Liu, Tal Malkin, Kailash Meiyappan. 23-36 [doi]
- Attacking Noisy Secret CRT-RSA Exponents in Binary MethodKento Oonishi, Noboru Kunihiro. 37-54 [doi]
- Compact Implementation of Modular Multiplication for Special Modulus on MSP430XHwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Zhi Hu. 55-66 [doi]
- Multi-identity IBFHE and Multi-attribute ABFHE in the Standard ModelXuecheng Ma, Dongdai Lin. 69-84 [doi]
- Approximate Homomorphic Encryption over the Conjugate-Invariant RingDuhyeong Kim, Yongsoo Song. 85-102 [doi]
- Excalibur Key-Generation Protocols for DAG Hierarchic DecryptionLouis Goubin, Geraldine Monsalve, Juan L. Reutter, Francisco José Vial Prado. 103-120 [doi]
- The Six-Card Trick: Secure Computation of Three-Input EqualityKazumasa Shinagawa, Takaaki Mizuki. 123-131 [doi]
- Unconditionally Secure Distributed Oblivious Polynomial EvaluationLouis Cianciullo, Hossein Ghodosi. 132-142 [doi]
- An Efficient Private Evaluation of a Decision GraphHiroki Sudo, Koji Nuida, Kana Shimizu. 143-160 [doi]
- Key Reuse Attack on NewHope Key Exchange ProtocolChao Liu, Zhongxiang Zheng, Guangnan Zou. 163-176 [doi]
- Supersingular Isogeny Diffie-Hellman Authenticated Key ExchangeAtsushi Fujioka, Katsuyuki Takashima, Shintaro Terada, Kazuki Yoneyama. 177-195 [doi]
- On the Complexity of the LWR-Solving BKW AlgorithmHiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi. 196-214 [doi]
- A Hierarchical Secret Sharing Scheme Based on Information Dispersal TechniquesKoji Shima, Hiroshi Doi. 217-232 [doi]
- Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean FunctionsRomar B. dela Cruz, Say Ol. 233-247 [doi]
- A New Privacy-Preserving Searching Model on BlockchainMeiqi He, Gongxian Zeng, Jun Zhang, Linru Zhang, Yuechen Chen, Siu-Ming Yiu. 248-266 [doi]
- \mathsf ELSA : Efficient Long-Term Secure Storage of Large DatasetsMatthias Geihs, Johannes Buchmann 0001. 269-286 [doi]
- How to Block the Malicious Access to Android External StorageSisi Yuan, Yuewu Wang, Pingjian Wang, Lingguang Lei, Quan Zhou, Jun Li. 287-303 [doi]
- A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy ApplicationsRadhakrishna Bhat, N. R. Sunitha. 304-321 [doi]
- Practical Algebraic Side-Channel Attacks Against ACORNAlexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier. 325-340 [doi]
- A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC CodesTung Chou, Yohei Maezawa, Atsuko Miyaji. 341-353 [doi]
- Recurrent Neural Networks for Fuzz Testing Web BrowsersMartin Sablotny, Bjørn Sand Jensen, Chris W. Johnson 0001. 354-370 [doi]