Abstract is missing.
- Identity-Based Lossy Encryption from Learning with ErrorsJingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue, Xiaochao Sun. 3-20 [doi]
- Adaptive-ID Secure Revocable Hierarchical Identity-Based EncryptionJae Hong Seo, Keita Emura. 21-38 [doi]
- Invalid Curve Attacks in a GLS SettingTaechan Kim, Mehdi Tibouchi. 41-55 [doi]
- New Fast Algorithms for Elliptic Curve Arithmetic in Affine CoordinatesWei Yu, Kwang Ho Kim, Myong Song Jo. 56-64 [doi]
- Implicit Factorization of RSA Moduli Revisited (Short Paper)Liqiang Peng, Lei Hu, Yao Lu, Zhangjie Huang, Jun Xu. 67-76 [doi]
- Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression FunctionsBingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li. 79-96 [doi]
- Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-sSiwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan, Ling Song. 97-111 [doi]
- NM-CPA Secure Encryption with Proofs of Plaintext KnowledgeBen Smyth, Yoshikazu Hanatani, Hirofumi Muratani. 115-134 [doi]
- Improvement of UC Secure Searchable Symmetric Encryption SchemeShunsuke Taketani, Wakaha Ogata. 135-152 [doi]
- Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval ModelTingting Zhang, Hongda Li. 153-172 [doi]
- LWE-Based FHE with Better ParametersFuqun Wang, Kunpeng Wang, Bao Li. 175-192 [doi]
- Improved Efficiency of MP12Fuyang Fang, Bao Li, Xianhui Lu, Xiaochao Sun. 193-210 [doi]
- Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit StringsHidetaka Hoshino, Satoshi Obana. 213-222 [doi]
- k-Anonymous Microdata Release via Post Randomisation MethodDai Ikarashi, Ryo Kikuchi, Koji Chida, Katsumi Takahashi. 225-241 [doi]
- On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic DataTadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka. 242-261 [doi]
- Anonymous Credential System with Efficient Proofs for Monotone Formulas on AttributesShahidatul Sadiah, Toru Nakanishi, Nobuo Funabiki. 262-278 [doi]
- Secure Multi-Party Computation Using Polarizing CardsKazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto. 281-297 [doi]
- An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External NetworksTakaya Ezaki, Tomohiro Date, Hiroyuki Inoue. 301-315 [doi]
- Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big DataTong Liu, Yazhe Wang. 316-334 [doi]
- Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)Reina Yagasaki, Kazuo Sakiyama. 335-344 [doi]
- Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper)Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing. 347-356 [doi]