Accepted Papers
Yassine Lemmou and El Mamoun Souidi
Inside GandCrab Ransomware
Zhen Liu, Yanbin Pan and Tianyuan Xie
Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project
Masahito Ishizaka and Kanta Matsuura
Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
Stephan Krenn, Henrich C. Pöhls, Kai Samelin and Daniel Slamanig
Protean Signature Schemes
Paolo Santini, Marco Baldi and Franco Chiaraluce
Assessing and countering reaction attacks against post-quantum public-key cryptosystems based on QC-LDPC codes
Kamalesh Acharya and Ratna Dutta
Constructions of Secure Multi-channel Broadcast Encryption Schemes in Public Key Framework
Bart Mennink
The Relation Between CENC and NEMO
Michael Denzel and Mark Ryan
Malware Tolerant (Mesh-)Networks
Momonari Kudo, Yuki Yokota, Yasushi Takahashi and Masaya Yasuda
Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation
Yusuke Naito
On the Efficiency of ZMAC-Type Modes
Daniel Gardham, Constantin Catalin Dragan and Mark Manulis
Hierarchical Attribute-based Signatures
Liran Orevi, Amir Herzberg and Haim Zlatokrilov
DNS-DNS: DNS-based De-NAT Scheme
Varsha Bhat and Sudarshan Iyengar
Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach
François Gérard and Keno Merckx
SETLA: Signature and Encryption from Lattices
Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii
Several MILP-Aided Attacks against SNOW 2.0
Huy Quoc Le, Pradeep Kumar Mishra, Dung Hoang Duong and Masaya Yasuda
Solving LWR using BDD Strategy: Modulus Switching Approach
Johannes Blömer, Fabian Eidens and Jakob Juhnke
Enhanced Security of Attribute-Based Signatures
Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marcos Manzano and Victor Mateu
Code-based signature schemes from identification protocols in the rank metric
Elena Pagnin, Carlo Brunetta and Pablo Picazo-Sanchez
HIKE: Walking the Privacy Trail
Hao Wu, Hsu-Chun Hsiao, Daniele E. Asoni, Simon Scherrer, Adrian Perrig and Yih-Chun Hu
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core
Donald Nokam Kuate, Sébastien Canard and Renaud Sirdey
Towards video compression in the encrypted domain: a case-study on the H264 and HEVC macroblock processing pipeline
Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko and Zheng Yang
Faster Privacy-Preserving Location Proximity Schemes
Javier Herranz and Germán Sáez
Secret Sharing Schemes for (k,n)-Consecutive Access Structures
Răzvan Roşie
Adaptive-Secure VRFs with Shorter Keys from Static Assumptions
Koray Karabina and Angela Robinson
Extending a Framework for Biometric Visual Cryptography