• Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound  by Eik List and Alexander Moch
  • Benchmarking Privacy Preserving Scientific Operations by Nigel Smart and Abdelrahaman Aly
  • Unbounded Inner-Product Functional Encryption with Succinct Keys by Edouard Dufour-Sans and David Pointcheval
  • Faster multiplication in $\mathbb{Z}_{2^m}[x]$ on Cortex-M4 to speed up NIST PQC candidates by Matthias J. Kannwischer, Joost Rijneveld and Peter Schwabe
  • Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing by Aner Ben Efraim and Eran Omri
  • One Sample Ring-LWE with Rounding and its Application to Key Exchange by Jintai Ding, Tsuyoshi Takagi, Xinwei Gao and Yuntao Wang
  • DynOpVm: VM-based Software Obfuscation with Dynamic Opcode Mapping by Xiaoyang Cheng, Yan Lin, Debin Gao and Chunfu Jia
  • Raptor: A Practical Lattice-Based (Linkable) Ring Signature by Xingye Lu, Man Ho Au and Zhenfei Zhang
  • Proxy Re-Encryption and Re-Signatures from Lattices by Xiong Fan and Feng-Hao Liu
  • Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners by Sang-Yoon Chang, Younghee Park, Simeon Wuthier and Chang-Wu Chen
  • pRate: Anonymous Star Rating with Rating Secrecy by Jia Liu and Mark Manulis
  • Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures by Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu and Dongxi Liu
  • Generic and Practical Key Establishment from Lattice by Zhengzhong Jin and Yunlei Zhao
  • Masking Dilithium: Efficient Implementation and Side-Channel Evaluation by Vincent Migliore, Benoît Gérard, Mehdi Tibouchi and Pierre-Alain Fouque
  • Cryptanalysis of ForkAES by Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha and Yu Sasaki
  • DL-Extractable UC-Commitment Schemes by Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim and Michal Zajac
  • Re: What’s up Johnny? — Covert Content Attacks on Email End-to-End Encryption by Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel and Jörg Schwenk
  • A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS by John Henry Castellanos and Jianying Zhou
  • Public Immunization against Complete Subversion without Random Oracles by Giuseppe Ateniese, Danilo Francati, Bernardo Magri and Daniele Venturi
  • Rate-Optimizing Compilers for Continuously Non-Malleable Codes by Sandro Coretti, Antonio Faonio and Daniele Venturi
  • Homomorphic Training of 30,000 Logistic Regression Models by Flavio Bergamaschi, Shai Halevi, Tzipora Halevi and Hamish Hunt
  • Longitudinal Analysis of Misuse of Bitcoin by Karim Eldefrawy, Ashish Gehani and Alexandre Matton
  • Strong Leakage and tamper-resilient Public Key Encryption from Refined Hash Proof Systems by Shi-Feng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu and Joseph Liu
  • A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups by Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek and Nan Li
  • Password-Authenticated Public-Key Encryption by Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven and Jiayu Xu
  • PassGAN: A Deep Learning Approach for Password Guessing by Briland Hitaj, Paolo Gasti, Giuseppe Ateniese and Fernando Perez-Cruz
  • Masking Fuzzy-Searchable Public Databases by Alexandra Boldyreva, Tianxin Tang and Bogdan Warinschi
  • Hide and Seek: An Architecture for Improving Attack Visibility in Industrial Control Systems by Jairo Giraldo, David Urbina, Alvaro Cardenas and Nils Tippenhauer
  • Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length by Daniel Gardham and Mark Manulis