1. Takaaki Mizuki, Michihito Kumamoto and Hideaki Sone. The Five-Card Trick Can Be Done with Four Cards
2. Florian Mendel, Vincent Rijmen, Deniz Toz and Kerem Varici. Differential Analysis of the LED Block Cipher
3. Meicheng Liu, Yin Zhang and Dongdai Lin. Perfect Algebraic Immune Functions
4. Saqib A. Kakvi, Eike Kiltz and Alexander May. Certifying RSA
5. Nuttapong Attrapadung, Benoit Libert and Thomas Peters. Computing on Authenticated Data: New Privacy Definitions and Constructions
6. Michael Gerbush, Allison Lewko, Adam O'Neill and Brent Waters. Dual Form Signatures: An Approach for Proving Security from Static Assumptions
7. Kyle Brogle, Sharon Goldberg and Leonid Reyzin. Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations
8. Joppe W. Bos and Thorsten Kleinjung. ECM at Work
9. Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang and San Ling. Differential Attacks Against Stream Cipher ZUC
10. Patrick Longa and Francesco Sica. Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
11. Tatsuaki Okamoto and Katsuyuki Takashima. Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
12. Josep Balasch, Sebastian Faust and Benedikt Gierlichs. Theory and Practice of a Leakage Resilient Masking Scheme
13. Thomas Peyrin, Yu Sasaki and Lei Wang. Generic Related-key Attacks for HMAC
14. Rodolphe Lampe, Jacques Patarin and Yannick Seurin. An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
15. Kenneth G. Paterson, Antigoni Polychroniadou and Dale L. Sibborn. A Coding-Theoretic Approach to Recovering Noisy RSA Keys
16. Gilad Asharov and Claudio Orlandi. Calling out Cheaters: Covert Security With Public Verifiability
17. Christophe Petit and Jean-Jacques Quisquater. On Polynomial Systems Arising from a Weil Descent
18. Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt and Angela Zottarel. Signatures schemes Secure against Hard-to-Invert Leakage
19. Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki and Miyako Ohkubo. Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
20. Jooyoung Lee. Provable Security of the Knudsen-Preneel Compression Functions
21. Bart Mennink. Optimal Collision Security in Double Block Length Hashing with Single Length Key
22. Leo Ducas and Phong Q.Nguyen. Gaussian Lattice Sampling with Quasi-Optimal Running Time
23. Leo Ducas and Phong Q.Nguyen. Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures
24. Yu Sasaki, Lei Wang, Shuang Wu and Wenling Wu. Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
25. Dimitar Jetchev, Onur Ozen and Martijn Stam. Understanding Adaptivity: Random Systems Revisited
26. Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara and Tsuyoshi Takagi. Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$
27. Mihir Bellare, Kenneth G. Paterson and Susan Thomson. RKA-Security beyond the Linear Barrier
28. Jae Hong Seo. On the (Im)possibility of Projecting Property in Prime-Order Setting
29. Mihir Bellare, Viet Tung Hoang and Phillip Rogaway. Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
30. Julia Borghoff, Anne Canteaut, Tim G\"{u}neysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzi Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Soren S. Thomsen, Tolga Yal\c{c}{\i}n. "PRINCE: A Low-latency Block Cipher for Pervasive Computing Applications"
31. Nico Doettling, Joern Mueller-Quade and Anderson C. A. Nascimento. IND-CCA secure Cryptography based on a variant of the LPN Problem
32. Liting Zhang, Wenling Wu and Han Sui and Peng Wang. 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
33. Shahram Khazaei, Tal Moran and Douglas Wikstr{\"o}m. A Mix-Net From Any CCA2 Secure Cryptosystem
34. David Bernhard, Olivier Pereira and Bogdan Warinschi. How not to Prove Yourself: Pitfalls of Fiat-Shamir and Applications to Helios
35. Gaetan Leurent. Analysis of differential attacks in ARX constructions
36. Andrey Bogdanov, Gregor Leander, Kaisa Nyberg and Meiqin Wang. Integral and Multidimensional Linear Distinguishers with Correlation Zero
37. Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak and Aris Tentes. Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems
38. Dmitry Khovratovich. Bicliques for permutations: collision and preimage attacks in stronger settings
39. Huijia Lin, Rafael Pass and Muthuramakrishnan Venkitasubramaniam. A Unified Framework for UC from only OT
40. Nicolas Veyrat-Charvillon, Marcel Medwed, Stephanie Kerckhof and Francois-Xavier Standaert. Shuffling Against Side-Channel Attacks: a Comprehensive Study with Cautionary Note
41. Eran Omri and Hila Zarosim. Completeness for Symmetric Two-Party Functionalities - Revisited
42. Jorge Luis Villar. Optimal Reductions of Some Decisional Problems to the Rank Problem
43. Scott Ames, Rosario Gennaro and Muthuramakrishnan Venkitasubramaniam. The Generalized Randomized Iterate and its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions