Abstract is missing.
- Formal Treatment of Privacy-Enhancing Credential SystemsJan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen. 3-24 [doi]
- Minimizing the Number of Bootstrappings in Fully Homomorphic EncryptionMarie Paindavoine, Bastien Vialla. 25-43 [doi]
- Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing AttacksHaruna Higo, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana. 44-64 [doi]
- Practical Cryptanalysis of Full Sprout with TMD Tradeoff AttacksMuhammed F. Esgin, Orhun Kara. 67-85 [doi]
- Related-Key Attack on Full-Round PICAROAnne Canteaut, Virginie Lallemand, María Naya-Plasencia. 86-101 [doi]
- Cryptanalysis of Feistel Networks with Secret Round FunctionsAlex Biryukov, Gaëtan Leurent, Léo Perrin. 102-121 [doi]
- Improved Meet-in-the-Middle Distinguisher on Feistel SchemesLi Lin, Wenling Wu, Yafei Zheng. 122-142 [doi]
- Sandy2x: New Curve25519 Speed RecordsTung Chou. 145-160 [doi]
- ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p)Debapriya Basu Roy, Poulami Das 0003, Debdeep Mukhopadhyay. 161-177 [doi]
- Exploring Energy Efficiency of Lightweight Block CiphersSubhadeep Banik, Andrey Bogdanov, Francesco Regazzoni. 178-194 [doi]
- Forgery and Subkey Recovery on CAESAR Candidate iFeedWillem Schroé, Bart Mennink, Elena Andreeva 0001, Bart Preneel. 197-204 [doi]
- Key-Recovery Attacks Against the MAC Algorithm ChaskeyChrysanthi Mavromati. 205-216 [doi]
- Differential Forgery Attack Against LACGaëtan Leurent. 217-224 [doi]
- Private Information Retrieval with Preprocessing Based on the Approximate GCD ProblemThomas Vannet, Noboru Kunihiro. 227-240 [doi]
- Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity HardwareAttila Altay Yavuz, Jorge Guajardo. 241-259 [doi]
- Affine Equivalence and Its Application to Tightening Threshold ImplementationsPascal Sasdrich, Amir Moradi, Tim Güneysu. 263-276 [doi]
- Near Collision Side Channel AttacksBaris Ege, Thomas Eisenbarth, Lejla Batina. 277-292 [doi]
- Masking Large Keys in Hardware: A Masked Implementation of McElieceCong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt. 293-309 [doi]
- Fast and Memory-Efficient Key Recovery in Side-Channel AttacksAndrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman. 310-327 [doi]
- An Efficient Post-Quantum One-Time Signature SchemeKassem Kalach, Reihaneh Safavi-Naini. 331-351 [doi]
- Constructing Lightweight Optimal Diffusion Primitives with Feistel StructureZhiyuan Guo, Wenling Wu, Si Gao. 352-372 [doi]
- Construction of Lightweight S-Boxes Using Feistel and MISTY StructuresAnne Canteaut, Sébastien Duval, Gaëtan Leurent. 373-393 [doi]
- A New Mode of Operation for Incremental Authenticated Encryption with Associated DataYu Sasaki, Kan Yasuda. 397-416 [doi]
- Scope: On the Side Channel Vulnerability of Releasing Unverified PlaintextsDhiman Saha, Dipanwita Roy Chowdhury. 417-438 [doi]
- Bit Security of the CDH Problems over Finite FieldsMingqiang Wang, Tao Zhan, Haibin Zhang. 441-461 [doi]
- Towards Optimal Bounds for Implicit Factorization ProblemYao Lu, Liqiang Peng, Rui Zhang 0002, Lei Hu, Dongdai Lin. 462-476 [doi]
- Forgery Attacks on Round-Reduced ICEPOLE-128Christoph Dobraunig, Maria Eichlseder, Florian Mendel. 479-492 [doi]
- Analysis of the CAESAR Candidate SilverJérémy Jean, Yu Sasaki, Lei Wang 0031. 493-509 [doi]
- Cryptanalysis of the Authenticated Encryption Algorithm COFFEIvan Tjuawinata, Tao Huang, Hongjun Wu. 510-526 [doi]