Abstract is missing.
- PKP-Based Signature SchemeWard Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret. 3-22 [doi]
- Modification Tolerant Signature Schemes: Location and CorrectionThaís Bardini Idalino, Lucia Moura, Carlisle Adams. 23-44 [doi]
- Rerandomizable Signatures Under Standard AssumptionSanjit Chatterjee, R. Kabaleeshwaran. 45-67 [doi]
- Improved Filter Permutators for Efficient FHE: Better Instances and ImplementationsPierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert. 68-91 [doi]
- RC4: Non-randomness in the Index j and Some Results on Its CyclesChandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra. 95-114 [doi]
- Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and ApplicationsMingjiang Huang, Liming Wang. 115-138 [doi]
- Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier. 139-159 [doi]
- Some Cryptanalytic Results on TRIADAbhishek Kesarwani, Santanu Sarkar 0001, Ayineedi Venkateswarlu. 160-174 [doi]
- Cryptanalysis of Round-Reduced KECCAK Using Non-linear StructuresMahesh Sreekumar Rajasree. 175-192 [doi]
- Nummatus: A Privacy Preserving Proof of Reserves Protocol for QuisquisArijit Dutta, Arnab Jana, Saravanan Vijayakumaran. 195-215 [doi]
- Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure ComputationSibi Raj B. Pillai, Manoj Prabhakaran, Vinod M. Prabhakaran, Srivatsan Sridhar. 216-226 [doi]
- MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active SecurityDragos Rotaru, Tim Wood 0003. 227-249 [doi]
- A Blind Coupon Mechanism Enabling Veto Voting over Unreliable NetworksColin Boyd, Kristian Gjøsteen, Clémentine Gritti, Thomas Haines. 250-270 [doi]
- UC Priced Oblivious Transfer with Purchase Statistics and Dynamic PricingAditya Damodaran, Maria Dubovitskaya, Alfredo Rial. 273-296 [doi]
- Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its ApplicationsDongxue Pan, Bei Liang, Hongda Li, Peifang Ni. 297-317 [doi]
- Privacy Amplification from Non-malleable CodesEshan Chattopadhyay, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar. 318-337 [doi]
- Vectorial Boolean Functions with Very Low Differential-Linear Uniformity Using Maiorana-McFarland Type ConstructionDeng Tang, Bimal Mandal, Subhamoy Maitra. 341-360 [doi]
- On the Relationship Between Resilient Boolean Functions and Linear Branch Number of S-BoxesSumanta Sarkar, Kalikinkar Mandal, Dhiman Saha. 361-374 [doi]
- The Complete Cost of Cofactor h=1Peter Schwabe, Daan Sprenkels. 375-397 [doi]
- Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial ReconstructionJun Xu 0022, Santanu Sarkar 0001, Lei Hu. 398-411 [doi]
- Efficient Quantum Algorithms Related to Autocorrelation SpectrumDebajyoti Bera, Subhamoy Maitra, SAPV Tharrmashastha. 415-432 [doi]
- Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256Boyu Ni, Gembu Ito, Xiaoyang Dong, Tetsu Iwata. 433-455 [doi]
- Device Independent Quantum Key Distribution Using Three-Party Pseudo-TelepathyJyotirmoy Basak, Arpita Maitra, Subhamoy Maitra. 456-471 [doi]
- Generalized Approach for Analysing Quantum Key Distribution ExperimentsArpita Maitra, Suvra Sekhar Das. 472-491 [doi]
- Efficient Hardware Implementations of Grain-128AEADJonathan Sönnerup, Martin Hell, Mattias Sönnerup, Ripudaman Khattar. 495-513 [doi]
- Exploring Lightweight Efficiency of ForkAESFatih Balli, Subhadeep Banik. 514-534 [doi]
- FPGA Implementation and Comparison of Protections Against SCAs for RLWETimo Zijlstra, Karim Bigou, Arnaud Tisserand. 535-555 [doi]
- Analysis of the Strict Avalanche Criterion in Variants of Arbiter-Based Physically Unclonable FunctionsAkhilesh Anilkumar Siddhanti, Srinivasu Bodapati, Anupam Chattopadhyay, Subhamoy Maitra, Dibyendu Roy 0001, Pantelimon Stanica. 556-577 [doi]