Abstract is missing.
- An Obsession with DefinitionsPhillip Rogaway. 3-20 [doi]
- Anonymous Single-Round Server-Aided VerificationElena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka. 23-43 [doi]
- Secure Channels and Termination: The Last Word on TLSColin Boyd, Britta Hale. 44-65 [doi]
- Improved Security Notions for Proxy Re-Encryption to Enforce Access ControlEla Lee. 66-85 [doi]
- Optimal 2-3 Chains for Scalar MultiplicationCristobal Leiva, Nicolas Thériault. 89-108 [doi]
- Curve25519 for the Cortex-M4 and BeyondHayato Fujii, Diego F. Aranha. 109-127 [doi]
- Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAsTobias Oder, Tim Güneysu. 128-142 [doi]
- Theoretical Security Evaluation Against Side-Channel Cube Attack with Key EnumerationHaruhisa Kosuge, Hidema Tanaka. 145-165 [doi]
- On the Hardness of the Mersenne Low Hamming Ratio AssumptionMarc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache. 166-174 [doi]
- Energy-Efficient ARM64 Cluster with Cryptanalytic Applications - 80 Cores That Do Not Cost You an ARM and a LegThom Wiggers. 175-188 [doi]
- Generation of 8-Bit S-Boxes Having Almost Optimal Cryptographic Properties Using Smaller 4-Bit S-Boxes and Finite Field MultiplicationReynier Antonio de la Cruz Jiménez. 191-206 [doi]
- XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal HashingAshwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi. 207-227 [doi]
- Improved XKX-Based AEAD Scheme: Removing the Birthday TermsYusuke Naito. 228-246 [doi]
- Aggregation of Time-Series Data Under Differential PrivacyFilipp Valovich. 249-270 [doi]
- The Oblivious Machine - Or: How to Put the C into MPCMarcel Keller. 271-288 [doi]
- Concrete Efficiency Improvements for Multiparty Garbling with an Honest MajorityAner Ben-Efraim, Eran Omri. 289-308 [doi]
- Homomorphic Rank Sort Using Surrogate PolynomialsGizem S. Çetin, Berk Sunar. 311-326 [doi]
- On Trees, Chains and Fast Transactions in the BlockchainAggelos Kiayias, Giorgos Panagiotakos. 327-351 [doi]
- Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet SecurityDan Boneh, Rosario Gennaro, Steven Goldfeder. 352-377 [doi]
- Environmental Authentication in MalwareJeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bülent Yener. 381-400 [doi]
- Threshold Kleptographic Attacks on Discrete Logarithm Based SignaturesGeorge Teseleanu. 401-414 [doi]