Abstract is missing.
- Faster Zero-Knowledge Protocols and Applications - (Invited Talk Abstract)Claudio Orlandi. 1-11 [doi]
- Stochastic Side-Channel Leakage Analysis via Orthonormal DecompositionSylvain Guilley, Annelie Heuser, Ming Tang, Olivier Rioul. 12-27 [doi]
- Key-Policy Attribute-Based Encryption from Bilinear MapsFerucio Laurentiu Tiplea, Constantin Catalin Dragan, Anca-Maria Nica. 28-42 [doi]
- Security of Pseudo-Random Number Generators with Input - (Invited Talk)Damien Vergnaud. 43-51 [doi]
- Securing the Foundations of DemocracyPeter Y. A. Ryan. 52-66 [doi]
- Exploring Naccache-Stern Knapsack EncryptionÉric Brier, Rémi Géraud, David Naccache. 67-82 [doi]
- Proximity Assurances Based on Natural and Artificial Ambient EnvironmentsIakovos Gurulian, Konstantinos Markantonakis, Carlton Shepherd, Eibe Frank, Raja Naeem Akram. 83-103 [doi]
- Challenges of Federating National Data Access InfrastructuresMargus Freudenthal, Jan Willemson. 104-114 [doi]
- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral LeakageLukasz Krzywiecki, Marcin Slowik. 115-128 [doi]
- Evolution of the McEliece Public Key Encryption SchemeDominic Bucerzan, Vlad Dragoi, Hervé Talé Kalachi. 129-149 [doi]
- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail SearchYu Sasaki, Yosuke Todo. 150-165 [doi]
- Secretly Embedding Trapdoors into Contract Signing ProtocolsDiana Maimut, George Teseleanu. 166-186 [doi]
- On a Key Exchange ProtocolMugurel Barcau, Vicentiu Pasol, Cezar Plesca, Mihai Togan. 187-199 [doi]