Protocols
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
Lattice Cryptography
Practical post-quantum public key cryptosystem based on LWE
Analysis of Error Terms of Signatures Based on Learning with Errors
Encryption
Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups
Lossy Key Encapsulation Mechanism and Its Applications
Expanded Framework for Dual System Encryption and its Application
Adaptively Secure Broadcast Encryption with Dealership
Implementation and Algorithms
A new algorithm for residue multiplication modulo $2^{521}-1$
Enhancing Data Parallelism of Fully Homomorphic Encryption
An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication
Signatures (and Protocol)
Revisiting the Cubic UOV Signature Scheme
Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model
New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness
Analysis
Improved Results on Cryptanalysis of Prime Power RSA
On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round
On the Effectiveness of Code-reuse based Android Application Obfuscation.