Abstract is missing.
- On Quantum Related-Key Attacks on Iterated Even-Mansour CiphersAkinori Hosoyamada, Kazumaro Aoki. 3-18 [doi]
- The Beauty and the Beasts - The Hard Cases in LLL ReductionSaed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang. 19-35 [doi]
- Simple Infeasibility Certificates for Attack TreesAhto Buldas, Aleksandr Lenin, Jan Willemson, Anton Charnamord. 39-55 [doi]
- Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short Paper)Bingqing Xia, Dongyao Ji, Gang Yao. 56-66 [doi]
- Multipurpose Public-Key EncryptionRui Zhang, Kai He. 69-84 [doi]
- Secure Certificateless Proxy Re-encryption Without PairingVeronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Tarunpreet Bhatia, Olivier Markowitch. 85-101 [doi]
- Not All Browsers are Created Equal: Comparing Web Browser FingerprintabilityNasser Mohammed Al-Fannah, Wanpeng Li. 105-120 [doi]
- Evasion Attacks Against Statistical Code Obfuscation DetectorsJiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai. 121-137 [doi]
- Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible DifferentialsKota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata. 141-158 [doi]
- Security Analysis of a Verifiable Server-Aided Approximate Similarity ComputationRui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto. 159-178 [doi]
- Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012 (Short Paper)Baptiste Vinh Mau, Koji Nuida. 181-191 [doi]
- Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key GeneratorsAtsushi Fujioka. 192-211 [doi]
- Deterministic Identity-Based Encryption from Lattices with More Compact Public ParametersDaode Zhang, Fuyang Fang, Bao Li, Xin Wang. 215-230 [doi]
- IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper)Haiyang Xue, Bao Li, Xianhui Lu. 231-241 [doi]