Accepted Papers

1. Takaaki Mizuki, Michihito Kumamoto and Hideaki Sone. The Five-Card Trick Can Be Done with Four Cards

2. Florian Mendel, Vincent Rijmen, Deniz Toz and Kerem Varici. Differential Analysis of the LED Block Cipher

3. Meicheng Liu, Yin Zhang and Dongdai Lin. Perfect Algebraic Immune Functions

4. Saqib A. Kakvi, Eike Kiltz and Alexander May. Certifying RSA

5. Nuttapong Attrapadung, Benoit Libert and Thomas Peters. Computing on Authenticated Data: New Privacy Definitions and Constructions

6. Michael Gerbush, Allison Lewko, Adam O'Neill and Brent Waters. Dual Form Signatures: An Approach for Proving Security from Static Assumptions

7. Kyle Brogle, Sharon Goldberg and Leonid Reyzin. Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations

8. Joppe W. Bos and Thorsten Kleinjung. ECM at Work

9. Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang and San Ling. Differential Attacks Against Stream Cipher ZUC

10. Patrick Longa and Francesco Sica. Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication

11. Tatsuaki Okamoto and Katsuyuki Takashima. Fully Secure Unbounded Inner-Product and Attribute-Based Encryption

12. Josep Balasch, Sebastian Faust and Benedikt Gierlichs. Theory and Practice of a Leakage Resilient Masking Scheme

13. Thomas Peyrin, Yu Sasaki and Lei Wang. Generic Related-key Attacks for HMAC

14. Rodolphe Lampe, Jacques Patarin and Yannick Seurin. An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher

15. Kenneth G. Paterson, Antigoni Polychroniadou and Dale L. Sibborn. A Coding-Theoretic Approach to Recovering Noisy RSA Keys

16. Gilad Asharov and Claudio Orlandi. Calling out Cheaters: Covert Security With Public Verifiability

17. Christophe Petit and Jean-Jacques Quisquater. On Polynomial Systems Arising from a Weil Descent

18. Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt and Angela Zottarel. Signatures schemes Secure against Hard-to-Invert Leakage

19. Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki and Miyako Ohkubo. Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions

20. Jooyoung Lee. Provable Security of the Knudsen-Preneel Compression Functions

21. Bart Mennink. Optimal Collision Security in Double Block Length Hashing with Single Length Key

22. Leo Ducas and Phong Q.Nguyen. Gaussian Lattice Sampling with Quasi-Optimal Running Time

23. Leo Ducas and Phong Q.Nguyen. Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures

24. Yu Sasaki, Lei Wang, Shuang Wu and Wenling Wu. Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks

25. Dimitar Jetchev, Onur Ozen and Martijn Stam. Understanding Adaptivity: Random Systems Revisited

26. Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara and Tsuyoshi Takagi. Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$

27. Mihir Bellare, Kenneth G. Paterson and Susan Thomson. RKA-Security beyond the Linear Barrier

28. Jae Hong Seo. On the (Im)possibility of Projecting Property in Prime-Order Setting

29. Mihir Bellare, Viet Tung Hoang and Phillip Rogaway. Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing

30. Julia Borghoff, Anne Canteaut, Tim G\"{u}neysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzi Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Soren S. Thomsen, Tolga Yal\c{c}{\i}n. "PRINCE: A Low-latency Block Cipher for Pervasive Computing Applications"

31. Nico Doettling, Joern Mueller-Quade and Anderson C. A. Nascimento. IND-CCA secure Cryptography based on a variant of the LPN Problem

32. Liting Zhang, Wenling Wu and Han Sui and Peng Wang. 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound

33. Shahram Khazaei, Tal Moran and Douglas Wikstr{\"o}m. A Mix-Net From Any CCA2 Secure Cryptosystem

34. David Bernhard, Olivier Pereira and Bogdan Warinschi. How not to Prove Yourself: Pitfalls of Fiat-Shamir and Applications to Helios

35. Gaetan Leurent. Analysis of differential attacks in ARX constructions

36. Andrey Bogdanov, Gregor Leander, Kaisa Nyberg and Meiqin Wang. Integral and Multidimensional Linear Distinguishers with Correlation Zero

37. Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak and Aris Tentes. Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems

38. Dmitry Khovratovich. Bicliques for permutations: collision and preimage attacks in stronger settings

39. Huijia Lin, Rafael Pass and Muthuramakrishnan Venkitasubramaniam. A Unified Framework for UC from only OT

40. Nicolas Veyrat-Charvillon, Marcel Medwed, Stephanie Kerckhof and Francois-Xavier Standaert. Shuffling Against Side-Channel Attacks: a Comprehensive Study with Cautionary Note

41. Eran Omri and Hila Zarosim. Completeness for Symmetric Two-Party Functionalities - Revisited

42. Jorge Luis Villar. Optimal Reductions of Some Decisional Problems to the Rank Problem

43. Scott Ames, Rosario Gennaro and Muthuramakrishnan Venkitasubramaniam. The Generalized Randomized Iterate and its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions