Abstract is missing.
- Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear MapsPratish Datta, Ratna Dutta, Sourav Mukhopadhyay. 3-24 [doi]
- Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data SharingSikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay. 25-44 [doi]
- Lite-Rainbow: Lightweight Signature Schemes Based on Multivariate Quadratic Equations and Their Secure ImplementationsKyung-Ah Shim, Cheol-Min Park, Yoo-Jin Baek. 45-63 [doi]
- Lossy Projective Hashing and Its ApplicationsHaiyang Xue, Yamin Liu, Xianhui Lu, Bao Li. 64-84 [doi]
- (De-)Constructing TLS 1.3Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi. 85-102 [doi]
- Cryptanalysis of Variants of RSA with Multiple Small Secret ExponentsLiqiang Peng, Lei Hu, Yao Lu, Santanu Sarkar, Jun Xu, Zhangjie Huang. 105-123 [doi]
- Some Results on SproutSubhadeep Banik. 124-139 [doi]
- Linear Cryptanalysis of Reduced-Round SIMECK VariantsNasour Bagheri. 140-152 [doi]
- Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. AlKhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram. 153-179 [doi]
- Some Results Using the Matrix Methods on Impossible, Integral and Zero-Correlation Distinguishers for Feistel-Like CiphersThierry P. Berger, Marine Minier. 180-197 [doi]
- Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya. 198-217 [doi]
- Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINEHuiling Zhang, Wenling Wu. 218-237 [doi]
- Cryptanalysis of Two Fault Countermeasure SchemesSubhadeep Banik, Andrey Bogdanov. 241-252 [doi]
- Differential Fault Analysis of SHA-3Nasour Bagheri, Navid Ghaedi, Somitra Kumar Sanadhya. 253-269 [doi]
- A Key to Success - Success Exponents for Side-Channel DistinguishersSylvain Guilley, Annelie Heuser, Olivier Rioul. 270-290 [doi]
- Non-malleable Extractors with Shorter Seeds and Their ApplicationsYanqing Yao, Zhoujun Li. 293-311 [doi]
- Efficiently Simulating High Min-entropy Sources in the Presence of Side InformationMaciej Skorski. 312-325 [doi]
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight ApplicationsEge Gulcan, Aydin Aysu, Patrick Schaumont. 329-346 [doi]
- Low-Resource and Fast Binary Edwards Curves CryptographyBrian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani. 347-369 [doi]