Abstract is missing.
- Revisiting Single-Server Algorithms for Outsourcing Modular ExponentiationJothi Rangasamy, Lakshmi Kuppusamy. 3-20 [doi]
- Keyword Search Meets Membership Testing: Adaptive Security from SXDHSanjit Chatterjee, Sayantan Mukherjee. 21-43 [doi]
- Tweakable HCTR: A BBB Secure Tweakable Enciphering SchemeAvijit Dutta, Mridul Nandi. 47-69 [doi]
- Reconsidering Generic Composition: The Tag-then-Encrypt CaseFrancesco Berti, Olivier Pereira, Thomas Peters. 70-90 [doi]
- On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets RevisitedRana Barua, Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray. 91-104 [doi]
- Differential Fault Attack on SIMON with Very Few FaultsRavi Anand, Akhilesh Siddhanti, Subhamoy Maitra, Sourav Mukhopadhyay. 107-119 [doi]
- Cryptanalysis of 2 Round Keccak-384Rajendra Kumar, Nikhil Mittal, Shashank Singh 0007. 120-133 [doi]
- A Faster Way to the CSIDHMichael Meyer, Steffen Reith. 137-152 [doi]
- A Note on the Security of CSIDHJean-François Biasse, Annamaria Iezzi, Michael J. Jacobson Jr.. 153-168 [doi]
- Constructing Canonical Strategies for Parallel Implementation of Isogeny Based CryptographyAaron Hutchinson, Koray Karabina. 169-189 [doi]
- More Efficient Lattice PRFs from Keyed Pseudorandom SynthesizersHart Montgomery. 190-211 [doi]
- A Las Vegas Algorithm to Solve the Elliptic Curve Discrete Logarithm ProblemAyan Mahalanobis, Vivek Mohan Mallick, Ansari Abdullah. 215-227 [doi]
- Pairing-Friendly Twisted Hessian CurvesChitchanok Chuengsatiansup, Chloe Martindale. 228-247 [doi]
- A Family of FDH Signature Schemes Based on the Quadratic Residuosity AssumptionGiuseppe Ateniese, Katharina Fech, Bernardo Magri. 248-262 [doi]
- Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching MechanismMahdi Sajadieh, Mohammad Vaziri. 265-281 [doi]
- Tools in Analyzing Linear Approximation for Boolean Functions Related to FLIPSubhamoy Maitra, Bimal Mandal, Thor Martinsen, Dibyendu Roy 0001, Pantelimon Stanica. 282-303 [doi]
- Non-malleable Codes Against Lookahead TamperingDivya Gupta 0001, Hemanta K. Maji, Mingyuan Wang. 307-328 [doi]
- Obfuscation from Low Noise Multilinear MapsNico Döttling, Sanjam Garg, Divya Gupta 0001, Peihan Miao, Pratyay Mukherjee. 329-352 [doi]
- Non-Interactive and Fully Output Expressive Private ComparisonYu Ishimaki, Hayato Yamana. 355-374 [doi]
- Secure Computation with Constant Communication Overhead Using Multiplication EmbeddingsAlexander R. Block, Hemanta K. Maji, Hai H. Nguyen. 375-398 [doi]