Abstract is missing.
- Revised Version of Block Cipher CHAMDongyoung Roh, Bonwook Koo, YoungHoon Jung, Ilwoong Jeong, Donggeon Lee, Daesung Kwon, Woo-Hwan Kim. 1-19 [doi]
- Systematic Construction of Nonlinear Product Attacks on Block CiphersNicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek. 20-51 [doi]
- Authenticated Encryption Based on Lesamnta-LW Hashing ModeShoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida. 52-69 [doi]
- All the HIGHT You Need on Cortex-M4Hwajeong Seo, Zhe Liu 0001. 70-83 [doi]
- Fast AES Implementation Using ARMv8 ASIMD Without Cryptography ExtensionHayato Fujii, Félix Carvalho Rodrigues, Julio López. 84-101 [doi]
- FACE-LIGHT: Fast AES-CTR Mode Encryption for Low-End MicrocontrollersKyungHo Kim, Seungju Choi, Hyeokdong Kwon, Zhe Liu 0001, Hwajeong Seo. 102-114 [doi]
- Sum It Up: Verifiable Additive Homomorphic Secret SharingGeorgia Tsaloli, Aikaterini Mitrokotsa. 115-132 [doi]
- There Is Always an Exception: Controlling Partial Information Leakage in Secure ComputationMáté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt. 133-149 [doi]
- An Automated Security Analysis Framework and Implementation for MTD Techniques on CloudHooman Alavizadeh, Hootan Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, Masood Niazi Torshiz. 150-164 [doi]
- Security Analysis of Group Action Inverse Problem with Auxiliary Inputs with Application to CSIDH ParametersTaechan Kim 0001. 165-174 [doi]
- Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava CodeJayashree Dey, Ratna Dutta. 175-193 [doi]
- Improvement of Binary and Non Binary Statistical Decoding AlgorithmPierre-Louis Cayrel, Cheikh Thiécoumba Gueye, Junaid Ahmad Khan, Jean Belo Klamti, Edoardo Persichetti. 194-207 [doi]
- LizarMong: Excellent Key Encapsulation Mechanism Based on RLWE and RLWRChi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek. 208-224 [doi]
- Efficient Identity-Based Encryption from LWRJung Hee Cheon, Haejin Cho, Jaewook Jung, Joohee Lee, Keewoo Lee. 225-241 [doi]
- Faster Bootstrapping of FHE over the IntegersJung Hee Cheon, Kyoohyung Han, Duhyeong Kim. 242-259 [doi]
- Complete Addition Law for Montgomery CurvesJae Heon Kim, Je Hong Park, Dong Chan Kim, Woo-Hwan Kim. 260-277 [doi]
- Improved CRT-RSA Secret Key Recovery Method from Sliding Window LeakageKento Oonishi, Xiaoxuan Huang, Noboru Kunihiro. 278-296 [doi]
- Differential Random Fault Attacks on Certain CAESAR Stream CiphersKenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson. 297-315 [doi]