Abstract is missing.
- Elementary Attestation of Cryptographically Useful Composite ModuliRémi Géraud-Stewart, David Naccache. 1-12 [doi]
- Off-the-Shelf Security Testing Platform for Contactless SystemsYuanzhen Liu, Gerhard Petrus Hancke, Umair Mujtaba Qureshi. 13-23 [doi]
- k-Residuosity AssumptionDiana Maimut, George Teseleanu. 24-40 [doi]
- New Insights on Differential and Linear Bounds Using Mixed Integer Linear ProgrammingAnubhab Baksi. 41-54 [doi]
- Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious PlayersYoshifumi Manabe, Hibiki Ono. 55-70 [doi]
- Decentralized Multi-authority Anonymous Credential System with Bundled Languages on IdentifiersHiroaki Anada. 71-90 [doi]
- A Scalable Simulation of the BB84 Protocol Involving EavesdroppingMihai-Zicu Mina, Emil Simion. 91-109 [doi]
- Approach to Cryptography from Differential Geometry with ExampleTetsuya Nagano, Hiroaki Anada. 110-129 [doi]
- On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity ManagementAndreea-Elena Panait, Ruxandra F. Olimid. 130-145 [doi]
- Manager Asks: Which Vulnerability Must be Eliminated First?David Pecl, Yehor Safonov, Zdenek Martinasek, Matej Kacic, Lubomir Almer, Lukas Malina. 146-164 [doi]
- An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEMTung Chou. 165-184 [doi]
- Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative RobotsShurook S. Almohamade, John A. Clark, James Law. 185-197 [doi]
- Secure Speaker Recognition System Using Homomorphic EncryptionMihai-Cristian Chindris, Mihai Togan, Stefan-Ciprian Arseni. 198-211 [doi]
- Reliable RFID Offline PrivacyCristian Hristea. 212-226 [doi]
- Virtualization and Automation for Cybersecurity Training and ExperimentationIon Bica, Roxana Larisa Unc, Stefan Turcanu. 227-241 [doi]
- Long-Term Secure Deniable Group Key EstablishmentKashi Neupane. 242-256 [doi]
- Card-Based Covert LotteryYuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, Hideaki Sone. 257-270 [doi]
- Hardware-Accelerated Cryptography for Software-Defined Networks with P4Lukas Malina, David Smekal, Sara Ricci, Jan Hajny, Peter Cíbik, Jakub Hrabovsky. 271-287 [doi]
- Security Analysis Using Subjective Attack TreesNasser Al-Hadhrami, Matthew Collinson, Nir Oren. 288-301 [doi]