- Itai Dinur; Pawel Morawiecki; Josef Pieprzyk; Marian Srebrny; Michal Straus; Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function
- Dominique Unruh; Non-interactive zero-knowledge proofs in the quantum random oracle model
- Aaram Yun; Generic Hardness of the Multiple Discrete Logarithm Problem
- Koji Nuida; Kaoru Kurosawa; (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces
- Tore Kasper Frederiksen; Jesper Buus Nielsen; Claudio Orlandi; Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
- Razvan Barbulescu; Pierrick Gaudry; Aurore Guillevic; François Morain; Improving NFS for the discrete logarithm problem in non-prime finite fields
- Thomas Shrimpton; R. Seth Terashima; A Provable-Security Analysis of Intel's Secure Key RNG
- Gilad Asharov; Yehuda Lindell; Thomas Schneider; Michael Zohner; More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
- Anne Canteaut; Joëlle Roué; On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
- Alexander May; Ilya Ozerov; On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes
- Benoit Cogliati; Yannick Seurin; On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
- Cécile Pierrot; The Multiple Number Field Sieve with Conjugation and Generalized Joux-Lercier Methods
- Itai Dinur; Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
- Ilya Mironov; Noah Stephens-Davidowitz; Cryptographic Reverse Firewalls
- Gregor Leander; Brice Minaud; Sondre Rønjom; A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
- Xianhui Lu; Bao Li; Dingding Jia; KDM-CCA Security from RKA Secure Authenticated Encryption
- Léo Ducas; Daniele Micciancio; FHEW: Bootstrapping in less than a second
- Viet Tung Hoang; Ted Krovetz; Phillip Rogaway; Robust Authenticated-Encryption: AEZ and the Problem that it Solves
- Jung Hee Cheon; Damien Stehle; Fully Homomophic Encryption over the Integers Revisited
- Michel Abdalla; Fabrice Benhamouda; David Pointcheval; Disjunctions for Hash Proof Systems: New Constructions and Applications
- Eike Kiltz; Hoeteck Wee; Quasi-Adaptive NIZK for Linear Subspaces Revisited
- Yosuke Todo; Structural Evaluation by Generalized Integral Property
- Ronald Cramer; Ivan Damgaard; Nico Doettling; Serge Fehr; Gabriele Spini; Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
- Achiya Bar-On; Itai Dinur; Orr Dunkelman; Nathan Keller; Virginie Lallemand; Boaz Tsaban; Cryptanalysis of SP Networks with Partial Non-Linear Layers
- Gaëtan Leurent; Lei Wang; The Sum Can Be Weaker Than Each Part
- Alessandro Chiesa; Eran Tromer; Madars Virza; Cluster Computing in Zero Knowledge
- Susan Hohenberger; Venkata Koppula; Brent Waters; Universal Signature Aggregators
- Dan Boneh; Kevin Lewi; Mariana Raykova; Amit Sahai; Mark Zhandry; Joe Zimmerman; Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation
- Stefan Dziembowski; Sebastian Faust; Maciej Skórski; Noisy Leakage Revisited
- Samee Zahur; Mike Rosulek; David Evans; Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
- Shai Halevi; Victor Shoup; Bootstrapping for HElib
- Mihir Bellare; Viet Tung Hoang; Resisting randomness subversion: Fast deterministic and hedged public-key encryption in the standard model
- Alexandre Duc; Sebastian Faust; François-Xavier Standaert; Making Masking Security Proofs Concrete (Or How to Evaluate the Security of any Leaking Device)
- Yi-Kai Liu; Privacy Amplification in the Isolated Qubits Model
- Arash Afshar; Zhangxiang Hu; Payman Mohassel; Mike Rosulek; How to Efficiently Evaluate RAM Programs with Malicious Security
- Daniel J. Bernstein; Daira Hopwood; Andreas Hülsing; Tanja Lange; Ruben Niederhagen; Louiza Papachristodoulou; Michael Schneider; Peter Schwabe; Zooko Wilcox O'Hearn; SPHINCS: practical stateless hash-based signatures
- Dana Dachman-Soled; Feng-Hao Liu; Hong-Sheng Zhou; Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware
- Gilles Barthe; Yassine Lakhnech; Juan Manuel Crespo; Benedikt Schmidt; Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols
- Shashank Agrawal; Shweta Agrawal; Manoj Prabhakaran; Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
- Alexandre Duc; Florian Tramèr; Serge Vaudenay; Better Algorithms for LWE and LWR
- Dan Boneh; Divya Gupta; Ilya Mironov; Amit Sahai; Hosting Services on an Untrusted Cloud
- Masayuki Abe; Markulf Kohlweiss; Miyako Ohkubo; Mehdi Tibouchi; Fully Structure-Preserving Signatures and Shrinking Commitments
- Jens Groth; Markulf Kohlweiss; One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin
- Vadim Lyubashevsky; Thomas Prest; Quadratic Time; Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices
- Joe Zimmerman; How to Obfuscate Programs Directly
- Mohamed Ahmed Abdelraheem; Peter Beelen; Andrey Bogdanov; Elmar Tischhauser; Twisted Polynomials and Forgery Attacks on GCM
- Gilles Barthe; Sonia Belaid; Francois Dupressoir; Pierre-Alain Fouque; Benjamin Gregoire; Pierre-Yves Strub; Verified Implementations of Higher-Order Masking
- Jiang Zhang; Zhenfeng Zhang; Jintai Ding; Michael Snook; Özgür Dagdelen; Authenticated Key Exchange from Ideal Lattices
- Martin Albrecht; Christian Rechberger; Thomas Schneider; Tyge Tiessen; Michael Zohner; Ciphers for MPC and FHE
- Juan Garay; Aggelos Kiayias; Nikos Leonardos; The Bitcoin Backbone Protocol: Analysis and Applications
- Melissa Chase; Rafail Ostrovsky; Ivan Visconti; Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World
- Jie Chen; Romain Gay; Hoeteck Wee; Improved Dual System ABE in Prime-Order Groups via Encodings
- Yevgeniy Dodis; Chaya Ganesh; Alexander Golovnev; Ari Juels; Thomas Ristenpart; A Formal Treatment of Backdoored Pseudorandom Generators
- Josep Balasch; Sebastian Faust; Benedikt Gierlichs; Inner Product Masking Revisited
- Aggelos Kiayias; Thomas Zacharias; Bingsheng Zhang; End-to-End Verifiable Elections in the Standard Model
- Junghee Cheon; Kyoohyung Han; Changmin Lee; Hansol Ryu; Damien Stehlé; Cryptanalysis of the Multilinear Maps over the Integers
- Elette Boyle; Niv Gilboa; Yuval Ishai; Function Secret Sharing