Abstract is missing.
- Semi-bent Functions from Oval PolynomialsSihem Mesnager. 1-15 [doi]
- Efficient Generation of Elementary SequencesDavid Gardner, Ana Salagean, Raphael C.-W. Phan. 16-27 [doi]
- On the Homomorphic Computation of Symmetric Cryptographic PrimitivesSilvia Mella, Ruggero Susella. 28-44 [doi]
- Improved Security for a Ring-Based Fully Homomorphic Encryption SchemeJoppe W. Bos, Kristin Lauter, Jake Loftus, Michael Naehrig. 45-64 [doi]
- On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic EncryptionJoël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro, David A. Wilson. 65-84 [doi]
- On Minimal and Quasi-minimal Linear CodesGérard D. Cohen, Sihem Mesnager, Alain Patey. 85-98 [doi]
- A Code-Based Undeniable Signature SchemeCarlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Julien Schrek. 99-119 [doi]
- Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization HypothesisJames McLaughlin, John A. Clark. 120-140 [doi]
- Differential Cryptanalysis of Keccak VariantsStefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer. 141-157 [doi]
- Recovering Private Keys Generated with Weak PRNGsPierre-Alain Fouque, Mehdi Tibouchi, Jean-Christophe Zapalowicz. 158-172 [doi]
- A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature SchemeDavid Galindo, Srinivas Vivek. 173-192 [doi]
- High-order Masking by Using Coding Theory and Its Application to AESGuilhem Castagnos, Soline Renner, Gilles Zémor. 193-212 [doi]
- Hashing Mode Using a Lightweight BlockcipherHidenori Kuwakado, Shoichi Hirose. 213-231 [doi]
- Indifferentiability of Double Length Compression FunctionsBart Mennink. 232-251 [doi]
- Security Amplification against Meet-in-the-Middle Attacks Using WhiteningPierre-Alain Fouque, Pierre Karpman. 252-269 [doi]
- Secure Key Management in the CloudIvan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter. 270-289 [doi]
- Estimating Key Sizes for High Dimensional Lattice-Based SystemsJoop van de Pol, Nigel P. Smart. 290-303 [doi]
- Sub-linear Blind Ring Signatures without Random OraclesEssam Ghadafi. 304-323 [doi]
- Constructions of Signcryption in the Multi-user Setting from Identity-Based EncryptionRintaro Nakano, Junji Shikata. 324-343 [doi]
- Anonymous Constant-Size Ciphertext HIBE from Asymmetric PairingsSomindu C. Ramanna, Palash Sarkar. 344-363 [doi]