- Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound by Eik List and Alexander Moch
- Benchmarking Privacy Preserving Scientific Operations by Nigel Smart and Abdelrahaman Aly
- Unbounded Inner-Product Functional Encryption with Succinct Keys by Edouard Dufour-Sans and David Pointcheval
- Faster multiplication in $\mathbb{Z}_{2^m}[x]$ on Cortex-M4 to speed up NIST PQC candidates by Matthias J. Kannwischer, Joost Rijneveld and Peter Schwabe
- Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing by Aner Ben Efraim, Michael Nielsen and Eran Omri
- One Sample Ring-LWE with Rounding and its Application to Key Exchange by Jintai Ding, Tsuyoshi Takagi, Xinwei Gao and Yuntao Wang
- DynOpVm: VM-based Software Obfuscation with Dynamic Opcode Mapping by Xiaoyang Cheng, Yan Lin, Debin Gao and Chunfu Jia
- Raptor: A Practical Lattice-Based (Linkable) Ring Signature by Xingye Lu, Man Ho Au and Zhenfei Zhang
- Proxy Re-Encryption and Re-Signatures from Lattices by Xiong Fan and Feng-Hao Liu
- Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners by Sang-Yoon Chang, Younghee Park, Simeon Wuthier and Chang-Wu Chen
- pRate: Anonymous Star Rating with Rating Secrecy by Jia Liu and Mark Manulis
- Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures by Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu and Dongxi Liu
- Generic and Practical Key Establishment from Lattice by Zhengzhong Jin and Yunlei Zhao
- Masking Dilithium: Efficient Implementation and Side-Channel Evaluation by Vincent Migliore, Benoît Gérard, Mehdi Tibouchi and Pierre-Alain Fouque
- Cryptanalysis of ForkAES by Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha and Yu Sasaki
- DL-Extractable UC-Commitment Schemes by Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim and Michal Zajac
- Re: What’s up Johnny? — Covert Content Attacks on Email End-to-End Encryption by Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel and Jörg Schwenk
- A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS by John Henry Castellanos and Jianying Zhou
- Public Immunization against Complete Subversion without Random Oracles by Giuseppe Ateniese, Danilo Francati, Bernardo Magri and Daniele Venturi
- Rate-Optimizing Compilers for Continuously Non-Malleable Codes by Sandro Coretti, Antonio Faonio and Daniele Venturi
- Homomorphic Training of 30,000 Logistic Regression Models by Flavio Bergamaschi, Shai Halevi, Tzipora Halevi and Hamish Hunt
- Longitudinal Analysis of Misuse of Bitcoin by Karim Eldefrawy, Ashish Gehani and Alexandre Matton
- Strong Leakage and tamper-resilient Public Key Encryption from Refined Hash Proof Systems by Shi-Feng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu and Joseph Liu
- A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups by Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek and Nan Li
- Password-Authenticated Public-Key Encryption by Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven and Jiayu Xu
- PassGAN: A Deep Learning Approach for Password Guessing by Briland Hitaj, Paolo Gasti, Giuseppe Ateniese and Fernando Perez-Cruz
- Masking Fuzzy-Searchable Public Databases by Alexandra Boldyreva, Tianxin Tang and Bogdan Warinschi
- Hide and Seek: An Architecture for Improving Attack Visibility in Industrial Control Systems by Jairo Giraldo, David Urbina, Alvaro Cardenas and Nils Tippenhauer
- Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length by Daniel Gardham and Mark Manulis