Abstract is missing.
- Targeted Ciphers for Format-Preserving EncryptionSarah Miracle, Scott Yilek. 3-26 [doi]
- Variants of the AES Key Schedule for Better Truncated Differential BoundsPatrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin. 27-49 [doi]
- Analysis and Improvement of an Authentication Scheme in Incremental CryptographyLouiza Khati, Damien Vergnaud. 50-70 [doi]
- Integral Attacks on Round-Reduced Bel-T-256Muhammad ElSheikh, Mohamed Tolba, Amr M. Youssef. 73-91 [doi]
- Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE ModesYunwen Liu, Yu Sasaki, Ling Song 0001, Gaoli Wang. 92-114 [doi]
- Finding Integral Distinguishers with EaseZahra Eskandari, Andreas Brasen Kidmose, Stefan Kölbl, Tyge Tiessen. 115-138 [doi]
- Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AESKai Hu, Tingting Cui, Chao Gao, Meiqin Wang. 139-162 [doi]
- Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential CryptanalysisRalph Ankele, Stefan Kölbl. 163-190 [doi]
- Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable ClockDor Fledel, Avishai Wool. 193-215 [doi]
- Assessing the Feasibility of Single Trace Power Analysis of FrodoJoppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam. 216-234 [doi]
- Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based AnalysisBen Lapid, Avishai Wool. 235-256 [doi]
- Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and KetjeChristoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas. 257-277 [doi]
- EFLASH: A New Multivariate Encryption SchemeRyann Cartor, Daniel Smith-Tone. 281-299 [doi]
- Public Key Compression for Constrained Linear Signature SchemesWard Beullens, Bart Preneel, Alan Szepieniec. 300-321 [doi]
- On the Cost of Computing Isogenies Between Supersingular Elliptic CurvesGora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, Francisco Rodríguez-Henríquez. 322-343 [doi]
- A Full RNS Variant of Approximate Homomorphic EncryptionJung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song. 347-368 [doi]
- Analysis of Error-Correcting Codes for Lattice-Based Key ExchangeTim Fritzmann, Thomas Pöppelmann, Johanna Sepúlveda. 369-390 [doi]
- Provably Secure NTRUEncrypt over Any Cyclotomic FieldYang Wang, Mingqiang Wang. 391-417 [doi]
- A Generalized Attack on Some Variants of the RSA CryptosystemAbderrahmane Nitaj, Yanbin Pan, Joseph Tonien. 421-433 [doi]
- Injective Encodings to Binary Ordinary Elliptic CurvesMojtaba Fadavi, Reza Rezaeian Farashahi, Soheila Sabbaghian. 434-449 [doi]
- Unsupervised Machine Learning on Encrypted DataAngela Jäschke, Frederik Armknecht. 453-478 [doi]
- Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain KnowledgeBenjamin Hettwer, Stefan Gehrer, Tim Güneysu. 479-498 [doi]