Abstract is missing.
- Revocable Hierarchical Identity-Based Authenticated Key ExchangeYuki Okano, Junichi Tomida, Akira Nagai, Kazuki Yoneyama, Atsushi Fujioka, Koutarou Suzuki. 3-27 [doi]
- Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous ProblemGwangbae Choi, Serge Vaudenay. 28-47 [doi]
- Designated-Verifier Linkable Ring SignaturesPourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou. 51-70 [doi]
- ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent AvailabilitySnehil Joshi, Durgesh Pandey, Kannan Srinathan. 71-91 [doi]
- Delegating Supersingular Isogenies over $\mathbb {F}_{p^2}$ with Cryptographic ApplicationsRobi Pedersen, Osmanbey Uzunkol. 95-118 [doi]
- Improved Lattice-Based Mix-Nets for Electronic VotingValeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik. 119-136 [doi]
- Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-LatticePeixin Ren, Xiaozhuo Gu. 137-156 [doi]
- Improved Lattice Enumeration Algorithms by Primal and Dual Reordering MethodsKazuki Yamamura, Yuntao Wang 0002, Eiichiro Fujisaki. 159-174 [doi]
- Compiler-based Attack Origin Tracking with Dynamic Taint AnalysisOliver Braunsdorf, Stefan Sessinghaus, Julian Horsch. 175-191 [doi]
- Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic SystemsCongming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang 0001. 195-216 [doi]
- A Preimage Attack on Reduced Gimli-HashYongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong. 217-237 [doi]
- Algebraic Attacks on Grain-Like Keystream GeneratorsMatthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong. 241-270 [doi]
- Improved See-In-The-Middle Attacks on AESJonghyun Park, Hangi Kim, Jongsung Kim. 271-279 [doi]
- Differential Fault Attack on RoccaRavi Anand, Takanori Isobe 0001. 283-295 [doi]
- Differential Fault Attack on Lightweight Block Cipher PIPOSeonghyuck Lim, Jaeseung Han, Taeho Lee, Dong-Guk Han. 296-307 [doi]
- Learning-based Side-Channel Analysis on PIPOJi-Eun Woo, Jaeseung Han, Yeon-Jae Kim, Hye-Won Mun, Seonghyuck Lim, Tae-Ho Lee, Seong-Hyun An, Soo-Jin Kim, Dong-Guk Han. 308-321 [doi]
- Collision-Resistant and Pseudorandom Function Based on Merkle-Damgård Hash FunctionShoichi Hirose. 325-338 [doi]
- Forward Secure Message FrankingHiroki Yamamuro, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka. 339-358 [doi]
- New General Framework for Algebraic Degree Evaluation of NFSR-Based CryptosystemsLin Ding 0001, Zheng Wu. 359-375 [doi]
- T-depth Reduction Method for Efficient SHA-256 Quantum Circuit ConstructionJongheon Lee, Sokjoon Lee, You-Seok Lee, Dooho Choi. 379-402 [doi]
- Efficient Quantum Circuit of Proth Number Modular MultiplicationChanho Jeon, Donghoe Heo, MyeongHoon Lee, Sunyeop Kim, Seokhie Hong. 403-417 [doi]
- Grover on SM3Gyeongju Song, Kyungbae Jang, HyunJi Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo. 421-433 [doi]
- SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, HyunJi Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo. 434-444 [doi]