Abstract is missing.
- BASS: Boolean Automorphisms Signature SchemeDima Grigoriev, Ilia Ilmer, Alexey Ovchinnikov, Vladimir Shpilrain. 1-12 [doi]
- Using Page Offsets for Detecting Control-Flow AnomaliesEngincan Varan, Khadija Hanifi, Aysegul Rana Erdemli, Musa Unal, Yunus Emre Tat, Dilara Tekinoglu, Orçun Çetin, Ramin Fuladi, Cemal Yilmaz. 13-25 [doi]
- Elementary Remarks on Some Quadratic Based Identity Based Encryption SchemesPaul Cotan, George Teseleanu. 26-34 [doi]
- SDVS Sender-Privacy in the Multi-party SettingJeroen van Wier. 35-50 [doi]
- Software Mitigation of RISC-V Spectre AttacksRuxandra Balucea, Paul Irofti. 51-64 [doi]
- Pinky: A Modern Malware-Oriented Dynamic Information Retrieval ToolPaul Irofti. 65-78 [doi]
- M-Sel: A Message Selection Functional Encryption from Simple ToolsAhmad Khoureich Ka. 79-96 [doi]
- Deniable Public-Key Authenticated Quantum Key ExchangeJeroen van Wier, Arash Atashpendar, Peter B. Rønne. 97-112 [doi]
- Towards a Secure and Transparent Blockchain-Based System for e-Commerce DeliveriesAnastasia Theodouli, Evdoxia Manganopoulou, Athanasios Kalfoutzos, Athanasios Tzikas, Christos Tsislianis, Dimosthenis Ioannidis, Konstantinos Votis, Dimitrios Tzovaras. 113-125 [doi]
- Attacking Secure-Element-Hardened MCUboot Using a Low-Cost Fault Injection ToolkitMario Noseda, Simon Künzli. 126-143 [doi]
- OpenBSD Formal Driver Verification with SeL4Adriana Nicolae, Paul Irofti, Ioana Leustean. 144-156 [doi]
- An Efficient Small Modulus Test and Its Applications to Delegated Computation Without PreprocessingMatluba Khodjaeva, Giovanni Di Crescenzo. 157-177 [doi]
- Learning Burnside Homomorphisms with Rounding and Pseudorandom FunctionDhiraj K. Pandey, Antonio R. Nicolosi. 178-196 [doi]
- Some Results on Related Key-IV Pairs of EspressoGeorge Teseleanu. 197-216 [doi]