Abstract is missing.
- Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange Under Standard Assumptions Without Random OraclesRen Ishibashi, Kazuki Yoneyama. 3-27 [doi]
- Analysis of Client-Side Security for Long-Term Time-Stamping ServicesLong Meng, Liqun Chen. 28-49 [doi]
- Towards Efficient and Strong Backward Private Searchable Encryption with Secure EnclavesViet Vo, Shangqi Lai, Xingliang Yuan, Surya Nepal, Joseph K. Liu. 50-75 [doi]
- CECMLP: New Cipher-Based Evaluating Collaborative Multi-layer Perceptron Scheme in Federated LearningYuqi Chen 0011, Xiaoyu Zhang, Yi Xie, Meixia Miao, Xu Ma. 79-99 [doi]
- Blind Polynomial Evaluation and Data TradingYi Liu, Qi Wang, Siu-Ming Yiu. 100-129 [doi]
- Coin-Based Multi-party Fair ExchangeHandan Kilinç Alper, Alptekin Küpçü. 130-160 [doi]
- P2DEX: Privacy-Preserving Decentralized Cryptocurrency ExchangeCarsten Baum, Bernardo David, Tore Kasper Frederiksen. 163-194 [doi]
- + Up My Sleeve! A Hidden Secure Fallback for Cryptocurrency WalletsDavid Chaum, Mario Larangeira, Mario Yaksetig, William Carter. 195-219 [doi]
- Terrorist Attacks for Fake Exposure Notifications in Contact Tracing SystemsGennaro Avitabile, Daniele Friolo, Ivan Visconti. 220-247 [doi]
- Unlinkable and Invisible γ-Sanitizable SignaturesAngèle Bossuat, Xavier Bultel. 251-283 [doi]
- Partially Structure-Preserving Signatures: Lower Bounds, Constructions and MoreEssam Ghadafi. 284-312 [doi]
- An Efficient Certificate-Based Signature Scheme in the Standard ModelGuoqiang Wang, Yanmei Cao. 313-329 [doi]
- SnakeGX: A Sneaky Attack Against SGX EnclavesFlavio Toffalini, Mariano Graziano, Mauro Conti, Jianying Zhou 0001. 333-362 [doi]
- Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural NetworksHervé Chabanne, Jean-Luc Danger, Linda Guiga, Ulrich Kühne. 363-392 [doi]
- Efficient FPGA Design of Exception-Free Generic Elliptic Curve CryptosystemsKiyofumi Tanaka, Atsuko Miyaji, Yaoan Jin. 393-414 [doi]
- Access Control Encryption from Group EncryptionXiuhua Wang 0001, Harry W. H. Wong, Sherman S. M. Chow. 417-441 [doi]
- Password Protected Secret Sharing from LatticesPartha Sarathi Roy 0001, Sabyasachi Dutta, Willy Susilo, Reihaneh Safavi-Naini. 442-459 [doi]
- Efficient Homomorphic Conversion Between (Ring) LWE CiphertextsHao Chen, Wei Dai, Miran Kim, Yongsoo Song. 460-479 [doi]