Accepted Papers

Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys and Tim Guneysu
New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness
Sumit Kumar Debnath and Ratna Dutta
Improved Results on Cryptanalysis of Prime Power RSA
Liqiang Peng, Lei Hu and Yao Lu
Revisiting the Cubic UOV Signature Scheme
Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang and Tsuyoshi Takagi
Adaptively Secure Broadcast Encryption with Dealership
Kamalesh Acharya and Ratna Dutta
On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks
Yusong Du and Baodian Wei
A new algorithm for residue multiplication modulo $2^{521}-1$
Shoukat Ali and Murat Cenk
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round
Jingyi Feng, Hua Chen, Si Gao, Limin Fan and Dengguo Feng
Enhancing Data Parallelism of Fully Homomorphic Encryption
Paulo Martins and Leonel Sousa
Analysis of Error Terms of Signatures Based on Learning with Errors
Jeongsu Kim, Suyong Park, Seonggeun Kim, Busik Jang, Sang Geun Hahn, Sangim Jung and Dongyoung Roh
An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication
Md. Al-Amin Khandaker, Hirotaka Ono, Yasuyuki Nogami, Masaaki Shirase and Sylvain Duquesne
Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model
Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue
A Secure Group-Based AKA Protocol for Machine-Type Communications
Rosario Giustolisi, Christian Gehrmann, Markus Ahlstrom and Simon Holmberg
Lossy Key Encapsulation Mechanism and Its Applications
Yamin Liu, Xianhui Lu, Bao Li and Haiyang Xue
On the Effectiveness of Code-reuse based Android Application Obfuscation
Xiaoxiao Tang, Yu Liang, Xinjie Ma, Yan Lin and Debin Gao
Expanded Framework for Dual System Encryption and its Application
Minqian Wang and Zhenfeng Zhang
Practical post-quantum public key cryptosystem based on LWE
Jung Hee Cheon, Jinsu Kim, Kyoo Hyung Han, Yongha Son and Changmin Lee
Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups
Kwangsu Lee