Abstract is missing.
- Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input SettingXiang Xie, Rui Xue, Rui Zhang 0002. 1-18 [doi]
- Ring Switching in BGV-Style Homomorphic EncryptionCraig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart. 19-37 [doi]
- Zero-Knowledge Proofs with Low Amortized Communication from Lattice AssumptionsIvan Damgård, Adriana López-Alt. 38-56 [doi]
- Fully Anonymous Attribute Tokens from LatticesJan Camenisch, Gregory Neven, Markus Rückert. 57-75 [doi]
- Efficient Structure-Preserving Signature Scheme from Standard AssumptionsJan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev. 76-94 [doi]
- Compact Round-Optimal Partially-Blind SignaturesOlivier Blazy, David Pointcheval, Damien Vergnaud. 95-112 [doi]
- History-Free Sequential Aggregate SignaturesMarc Fischlin, Anja Lehmann, Dominique Schröder. 113-130 [doi]
- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLINMelissa Chase, Markulf Kohlweiss. 131-148 [doi]
- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext AwarenessSteven Myers, Mona Sergi, Abhi Shelat. 149-165 [doi]
- Decentralized Dynamic Broadcast EncryptionDuong Hieu Phan, David Pointcheval, Mario Strefler. 166-183 [doi]
- Time-Specific Encryption from Forward-Secure EncryptionKohei Kasamatsu, Takahiro Matsuda 0002, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai. 184-204 [doi]
- Improved Secure Two-Party Computation via Information-Theoretic Garbled CircuitsVladimir Kolesnikov, Ranjit Kumaresan. 205-221 [doi]
- 5PM: Secure Pattern MatchingJoshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler. 222-240 [doi]
- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC ProtocolIvan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart. 241-263 [doi]
- On the Centrality of Off-Line E-Cash to Concrete Partial Information GamesSeung Geol Choi, Dana Dachman-Soled, Moti Yung. 264-280 [doi]
- Universally Composable Security with Local AdversariesRan Canetti, Margarita Vald. 281-301 [doi]
- On the Strength Comparison of the ECDLP and the IFPMasaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu. 302-325 [doi]
- New Attacks for Knapsack Based CryptosystemsGottfried Herold, Alexander Meurer. 326-342 [doi]
- Multiple Differential Cryptanalysis Using LLR and χ 2 StatisticsCéline Blondeau, Benoît Gérard, Kaisa Nyberg. 343-360 [doi]
- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative RingsEnrico Thomae. 361-373 [doi]
- Homomorphic Encryption for Multiplications and Pairing EvaluationGuilhem Castagnos, Fabien Laguillaumie. 374-392 [doi]
- Publicly Verifiable CiphertextsJuan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila. 393-410 [doi]
- Public-Key Encryption with Lazy PartiesKenji Yasunaga. 411-425 [doi]
- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and ExponentiationChing-Hua Yu, Bo-Yin Yang. 426-444 [doi]
- MAC Aggregation with Message MultiplicityVladimir Kolesnikov. 445-460 [doi]
- Efficiency Limitations of Σ-Protocols for Group Homomorphisms RevisitedBjörn Terelius, Douglas Wikström. 461-476 [doi]
- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle ArgumentHelger Lipmaa, Bingsheng Zhang. 477-502 [doi]
- Active Security in Multiparty Computation over Black-Box GroupsYvo Desmedt, Josef Pieprzyk, Ron Steinfeld. 503-521 [doi]
- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long OutputArno Mittelbach. 522-539 [doi]
- Human Perfectly Secure Message Transmission Protocols and Their ApplicationsStelios Erotokritou, Yvo Desmedt. 540-558 [doi]
- Oblivious Transfer with Hidden Access Control from Attribute-Based EncryptionJan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven. 559-579 [doi]