Accepted Papers
- On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
 Mridul Nandi
- Efficient Fully Structure-Preserving Signatures for Large Messages
 Jens Groth
- Optimized Interpolation Attacks on LowMC
 Itai Dinur  & Yunwen Liu  & Willi Meier  & Qingju Wang
- Property Preserving Symmetric Encryption Revisited
 Sanjit Chatterjee  & M. Prem Laxman Das
- QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
 Alonso González & Alejandro Hevia & Carla Ràfols
- Multiple Discrete Logarithm Problems with Auxiliary Inputs
 Taechan Kim
- An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption
 Takahiro Matsuda & Goichiro Hanaoka
- Implementing Candidate Graded Encoding Schemes from Ideal Lattices
 Martin R. Albrecht & Catalin Cocis & Fabien Laguillaumie & Adeline Langlois
- Computing Individual Discrete Logarithms Faster in GF(p^n) with the NFS-DL Algorithm
 Aurore Guillevic
- Dual-System Simulation-Soundness with Applications to UC-PAKE and More
 Charanjit S. Jutla & Arnab Roy
- Riding on Asymmetry: Efficient ABE for Branching Programs
 Sergey Gorbunov & Dhinakaran Vinayagamurthy
- Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
 Susan Hohenberger & Venkata Koppula & Brent Waters
- The Tower Number Field Sieve
 Razvan Barbulescu & Pierrick Gaudry & Thorsten Kleinjung
- A Provably Secure Group Signature Scheme from Code-Based Assumptions
 Martianus Frederic Ezerman & Hyung Tae Lee & San Ling & Khoa Nguyen & Huaxiong Wang
- ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
 Vincent Grosso & François-Xavier Standaert
- A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
 Chun Guo & Dongdai Lin
- Type 2 Structure-Preserving Signature Schemes Revisited
 Sanjit Chatterjee & Alfred Menezes
- Analysis of SHA-512/224 and SHA-512/256
 Christoph Dobraunig & Maria Eichlseder & Florian Mendel
- Refinements of the k-tree Algorithm for the Generalized Birthday Problem
 Ivica Nikolić & Yu Sasaki
- Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
 Shi Bai & Adeline Langlois & Tancrède Lepoint & Damien Stehlé & Ron Steinfeld
- Solving Linear Equations Modulo Unknown Divisors: Revisited
 Yao Lu & Rui Zhang & Liqiang Peng & Dongdai Lin
- Another Tradeoff Attack on Sprout-like Stream Ciphers
 Bin Zhang & Xinxin Gong
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
 Benoît Cogliati & Yannick Seurin
- Design Principles for HFEv- based Multivariate Signature Schemes
 Albrecht Petzoldt & Ming-Shing Chen & Bo-Yin Yang & Chengdong Tao  & Jintai Ding
- Counting Keys in Parallel After a Side Channel Attack
 Daniel P. Martin & Jonathan O'Connell & Elisabeth Oswald & Martijn Stam
- Idealizing Identity-Based Encryption
 Dennis Hofheinz & Christian Matt & Ueli Maurer
- On Black-Box Complexity of Universally Composable Security in the CRS model
 Carmit Hazay & Muthuramakrishnan Venkitasubramaniam
- Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
 Bart Mennink & Reza Reyhanitabar & Damian Vizár
- On the Impact of Known-Key Attacks on Hash Functions
 Bart Mennink & Bart Preneel
- A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
 Liwei Zhang & A. Adam Ding & Yunsi Fei & Pei Luo
- Tradeoff Cryptanalysis of Memory-Hard Functions
 Alex Biryukov & Dmitry Khovratovich
- How to Sequentialize Independent Parallel Attacks?
 Sonia Bogos & Serge Vaudenay
- Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
 Christoph Dobraunig & Maria Eichlseder & Florian Mendel
- Generic Security of NMAC and HMAC with Input Whitening
 Peter Gaži & Krzysztof Pietrzak & Stefano Tessaro
- Selective Opening Security for Receivers
 Carmit Hazay & Arpita Patra & Bogdan Warinschi
- Reverse-engineering of the cryptanalytic attack used in the Flame super-malware
 Max Fillinger & Marc Stevens
- An Inverse-free Single Keyed Tweakable Enciphering Scheme
 Ritam Bhaumik & Mridul Nandi
- Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
 Benoît Libert & Thomas Peters & Marc Joye & Moti Yung
- Optimally Secure Block Ciphers from Ideal Primitives
 Stefano Tessaro
- A Unified Approach to MPC with Preprocessing using OT
 Tore Kasper Frederiksen & Marcel Keller & Emmanuela Orsini & Peter Scholl
- How Secure is AES under Leakage
 Andrey Bogdanov & Takanori Isobe
- New Circular Security Counterexamples from Decision Linear and Learning with Errors
 Allison Bishop & Susan Hohenberger & Brent Waters
- Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
 Jan Camenisch & Maria Dubovitskaya & Kristiyan Haralambiev & Markulf Kohlweiss
- Secret Sharing and Statistical Zero Knowledge
 Vinod Vaikuntanathan & Prashant N. Vasudevan
- Key-Recovery Attacks on ASASA
 Brice Minaud & Patrick Derbez & Pierre-Alain Fouque & Pierre Karpman
- Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
 Dana Dachman-Soled & Chang Liu & Charalampos Papamanthou & Elaine Shi & Uzi Vishkin
- Secure Computation from Millionaire
 abhi shelat & Muthuramakrishnan Venkitasubramaniam
- Midori: A Block Cipher for Low Energy
 Subhadeep Banik & Andrey Bogdanov & Takanori Isobe & Kyoji Shibutani & Harunaga Hiwatari & Toru Akishita & Francesco Regazzoni
- New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
 Tatsuaki Okamoto & Krzysztof Pietrzak & Brent Waters & Daniel Wichs
- On Cut-and-Choose Oblivious Transfer and Its Variants
 Vladimir Kolesnikov & Ranjit Kumaresan
- Public Verifiability in the Covert Model (Almost) for Free
 Vladimir Kolesnikov & Alex J. Malozemoff
- Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble
 Thomas Fuhr & Gaëtan Leurent & Valentin Suder
- Function-Hiding Inner Product Encryption
 Allison Bishop & Abhishek Jain & Lucas Kowalczyk
- Multi-Input Functional Encryption for Unbounded Arity Functions
 Saikrishna Badrinarayanan & Divya Gupta & Abhishek Jain & Amit Sahai
- Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
 Nuttapong Attrapadung & Goichiro Hanaoka & Shota Yamada
- Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
 Michel Abdalla & Fabrice Benhamouda & Alain Passelègue
- A Framework for Identity-Based Encryption with Almost Tight Security
 Nuttapong Attrapadung & Goichiro Hanaoka & Shota Yamada
- Garbling Scheme for Formulas with Constant Size of Garbled Gates
 Carmen Kempka & Ryo Kikuchi & Susumu Kiyoshima & Koutarou Suzuki
- Limits of Extractability Assumptions with Distributional Auxiliary Input 
 Elette Boyle & Rafael Pass
- FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
 Craig Costello & Patrick Longa
- Multi-Party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
 Dakshita Khurana & Vanishree Rao & Amit Sahai
- Card-based Cryptographic Protocols using a Minimal Number of Cards
 Alexander Koch & Stefan Walzer & Kevin Härtel
- Three-Party ORAM for Secure Computation
 Sky Faber & Stanislaw Jarecki & Sotirios Kentros & Boyang Wei
- Pure Differential Privacy for Rectangle Queries via Private Partitions
 Cynthia Dwork & Moni Naor & Omer Reingold & Guy Rothblum