Abstract is missing.
- Key-Private Proxy Re-encryption under LWEYoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang. 1-18 [doi]
- Breaking the ${\mathcal{O}}(n|C|)$ Barrier for Unconditionally Secure Asynchronous Multiparty Computation - (Extended Abstract)Ashish Choudhury. 19-37 [doi]
- Alternating Product Ciphers: A Case for Provable Security Comparisons - (Extended Abstract)John O. Pliam. 38-49 [doi]
- An Integral Distinguisher on Grøstl-512 v3Marine Minier, Gaël Thomas 0002. 50-59 [doi]
- Warrant-Hiding Delegation-by-Certificate Proxy Signature SchemesChristian Hanser, Daniel Slamanig. 60-77 [doi]
- Improved Scan-Chain Based Attacks and Related CountermeasuresSubhadeep Banik, Anusha Chowdhury. 78-97 [doi]
- Correlation Analysis against Protected SFM Implementations of RSAAurélie Bauer, Éliane Jaulmes. 98-115 [doi]
- Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power AnalysisChristophe Clavier, Quentin Isorez, Antoine Wurcker. 116-135 [doi]
- Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFNDonghoon Chang, Abhishek Kumar, Somitra Sanadhya. 136-148 [doi]
- Improbable Differential from Impossible Differential: On the Validity of the ModelCéline Blondeau. 149-160 [doi]
- Compact Authenticated Key Exchange from Bounded CCA-Secure KEMKazuki Yoneyama. 161-178 [doi]
- On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating DetectionMahabir Prasad Jhanwar, Reihaneh Safavi-Naini. 179-196 [doi]
- There's Something about m-ary - Fixed-Point Scalar Multiplication Protected against Physical AttacksBenoit Feix, Vincent Verneuil. 197-214 [doi]
- On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer PerspectiveFabrizio De Santis, Michael Kasper, Stefan Mangard, Georg Sigl, Oliver Stein, Marc Stöttinger. 215-226 [doi]
- Multi-precision Squaring for Public-Key Cryptography on Embedded MicroprocessorsHwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim. 227-243 [doi]
- 8/16/32 Shades of Elliptic Curve Cryptography on Embedded ProcessorsErich Wenger, Thomas Unterluggauer, Mario Werner. 244-261 [doi]
- Accelerating Sorting of Fully Homomorphic Encrypted DataAyantika Chatterjee, Manish Kaushal, Indranil Sengupta. 262-273 [doi]
- Construction of Recursive MDS Diffusion Layers from Gabidulin CodesThierry P. Berger. 274-285 [doi]
- Polynomial Structures in Code-Based CryptographyVlad Dragoi, Pierre-Louis Cayrel, Brice Colombier, Tania Richmond. 286-296 [doi]
- Security Analysis of the RC4+ Stream CipherSubhadeep Banik, Santanu Sarkar, Raghu Kacker. 297-307 [doi]
- On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible DifferentialsMarine Minier. 308-318 [doi]