Abstract is missing.
- On Existence (Based on an Arithmetical Problem) and Constructions of Bent FunctionsSihem Mesnager, Gérard D. Cohen, David Madore. 3-19 [doi]
- Security Against Related Randomness Attacks via Reconstructive ExtractorsKenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee. 23-40 [doi]
- MI-T-HFE, A New Multivariate Signature SchemeWenbin Zhang, Chik-How Tan. 43-56 [doi]
- A New Approach to Efficient Revocable Attribute-Based Anonymous CredentialsDavid Derler, Christian Hanser, Daniel Slamanig. 57-74 [doi]
- Tweak-Length Extension for Tweakable BlockciphersKazuhiko Minematsu, Tetsu Iwata. 77-93 [doi]
- Rogue Decryption Failures: Reconciling AE Robustness NotionsGuy Barwell, Daniel Page, Martijn Stam. 94-111 [doi]
- Robust Authenticated Encryption and the Limits of Symmetric CryptographyChristian Badertscher, Christian Matt 0002, Ueli Maurer, Phillip Rogaway, Björn Tackmann. 112-129 [doi]
- A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious TransferShota Goto, Junji Shikata. 133-151 [doi]
- Zero-Knowledge Interactive Proof Systems for New Lattice ProblemsClaude Crépeau, Raza Ali Kazmi. 152-169 [doi]
- Soft Distance Metric Decoding of Polar CodesMónica C. Liberatori, Leonardo J. Arnone, Jorge Castiñeira Moreira, Patrick Guy Farrell. 173-183 [doi]
- On the Doubly Sparse Compressed Sensing ProblemGrigory Kabatiansky, Serge G. Vladut, Cédric Tavernier. 184-189 [doi]
- Codes of Length 2 Correcting Single Errors of Limited SizeTorleiv Kløve. 190-201 [doi]
- Bent and Semi-bent Functions via Linear TranslatorsNese Koçak, Sihem Mesnager, Ferruh Özbudak. 205-224 [doi]
- Comparison of Cube Attacks Over Different Vector SpacesRichard Winter, Ana Salagean, Raphael C.-W. Phan. 225-238 [doi]
- On the Diffusion Property of Iterated FunctionsJian Liu, Sihem Mesnager, Lusheng Chen. 239-253 [doi]
- Shannon Entropy Versus Renyi Entropy from a Cryptographic ViewpointMaciej Skórski. 257-274 [doi]
- Continuous After-the-Fact Leakage-Resilient eCK-Secure Key ExchangeJanaka Alawatugoda, Douglas Stebila, Colin Boyd. 277-294 [doi]
- A Leakage Resilient MACDaniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wójcik. 295-310 [doi]
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of StorageGiuseppe Ateniese, Antonio Faonio, Seny Kamara. 311-328 [doi]