Abstract is missing.
- On the Leakage of Corrupted Garbled CircuitsAurélien Dupin, David Pointcheval, Christophe Bidan. 3-21 [doi]
- Location-Proof System Based on Secure Multi-party ComputationsAurélien Dupin, Jean-Marc Robert 0001, Christophe Bidan. 22-39 [doi]
- Verifiable Homomorphic Secret SharingGeorgia Tsaloli, Bei Liang, Aikaterini Mitrokotsa. 40-55 [doi]
- Single Private-Key Generator Security Implies Multiple Private-Key Generators SecurityAtsushi Fujioka, Kazuki Yoneyama. 56-74 [doi]
- Secure Outsourcing of Cryptographic Circuits ManufacturingGiuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi 0001. 75-93 [doi]
- On the Hardness of Learning Parity with Noise over RingsShuoyao Zhao, Yu Yu 0001, Jiang Zhang. 94-108 [doi]
- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption SchemeArinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan. 111-128 [doi]
- Multivariate Encryption Schemes Based on the Constrained MQ ProblemTakanori Yasuda. 129-146 [doi]
- Token-Based Multi-input Functional EncryptionNuttapong Attrapadung, Goichiro Hanaoka, Takato Hirano, Yutaka Kawai, Yoshihiro Koseki, Jacob C. N. Schuldt. 147-164 [doi]
- On the CCA2 Security of McEliece in the Standard ModelEdoardo Persichetti. 165-181 [doi]
- Efficient Attribute-Based Encryption with Blackbox TraceabilityShengmin Xu, Guomin Yang, Yi Mu 0001, Ximeng Liu. 182-200 [doi]
- A Code-Based Linkable Ring Signature SchemePedro Branco 0005, Paulo Mateus. 203-219 [doi]
- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature (Extended Abstract)Sanjit Chatterjee, R. Kabaleeshwaran. 220-238 [doi]
- Digital Signatures from the Middle-Product LWERyo Hiromasa. 239-257 [doi]
- Generic Double-Authentication Preventing Signatures and a Post-quantum InstantiationDavid Derler, Sebastian Ramacher, Daniel Slamanig. 258-276 [doi]
- A Simpler Construction of Identity-Based Ring Signatures from LatticesGongming Zhao, Miaomiao Tian. 277-291 [doi]
- Generic Construction of Sequential Aggregate MACs from Any MACsShingo Sato, Shoichi Hirose, Junji Shikata. 295-312 [doi]
- Length-Preserving Encryption Based on Single-Key Tweakable Block CipherXiangyang Zhang, Yaobin Shen, Hailun Yan, Ying Zou, Ming Wan, Zheyi Wu, Lei Wang 0031. 313-326 [doi]
- Modeling Privacy in WiFi Fingerprinting Indoor LocalizationZheng Yang 0001, Kimmo Järvinen 0001. 329-346 [doi]
- Security Notions for Cloud Storage and DeduplicationColin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani. 347-365 [doi]
- Forward Secrecy of SPAKE2José Becerra, Dimiter Ostrev, Marjan Skrobot. 366-384 [doi]
- User-Mediated Authentication Protocols and Unforgeability in Key CollisionBritta Hale. 387-396 [doi]
- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret SharingLeon J. Helsloot, Gamze Tillem, Zekeriya Erkin. 397-405 [doi]
- Signcryption with Quantum Random OraclesShingo Sato, Junji Shikata. 406-414 [doi]
- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation ProtocolsSatoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai 0001, Fuyuki Kitagawa, Yutaka Kawai, Goichiro Hanaoka. 415-422 [doi]