| 2015 | A Fully Decentralized Data Usage Control Enforcement Infrastructure. Florian Kelbert, Alexander Pretschner |
| 2015 | A Signature Scheme with a Fuzzy Private Key. Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki |
| 2015 | Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures. Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama |
| 2015 | Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA. Aleksandar Kircanski |
| 2015 | Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis |
| 2015 | Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. Tobias Schneider, Amir Moradi, Tim Güneysu |
| 2015 | Communication-Optimal Proactive Secret Sharing for Dynamic Groups. Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky |
| 2015 | Cryptographic Enforcement of Information Flow Policies Without Public Information. Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering |
| 2015 | Differential Power Analysis of a McEliece Cryptosystem. Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt |
| 2015 | Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher. Yuval Yarom, Gefei Li, Damith Chinthana Ranasinghe |
| 2015 | Exploiting Eye Tracking for Smartphone Authentication. Dachuan Liu, Bo Dong, Xing Gao, Haining Wang |
| 2015 | Foundations of Reconfigurable PUFs. Jonas Schneider, Dominique Schröder |
| 2015 | Generic Construction of UC-Secure Oblivious Transfer. Olivier Blazy, Céline Chevalier |
| 2015 | Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti |
| 2015 | LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data. Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang |
| 2015 | Non-malleability Under Selective Opening Attacks: Implication and Separation. Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen |
| 2015 | Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel |
| 2015 | On the XOR of Multiple Random Permutations. Bart Mennink, Bart Preneel |
| 2015 | Optimal Proximity Proofs Revisited. Handan Kilinç, Serge Vaudenay |
| 2015 | Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents. Atsushi Takayasu, Noboru Kunihiro |
| 2015 | Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget). Satrajit Ghosh, Aniket Kate |
| 2015 | Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe. Zhen Liu, Duncan S. Wong |
| 2015 | Private Database Access with HE-over-ORAM Architecture. Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova |
| 2015 | Recovering Lost Device-Bound Credentials. Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven |
| 2015 | Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications. Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao |
| 2015 | Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud |
| 2015 | Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model. Jing Xu, Xuexian Hu, Zhenfeng Zhang |
| 2015 | Scalable Divisible E-cash. Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré |
| 2015 | Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources. Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing |
| 2015 | Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract). Jiqiang Lu, Zhen Li, Matt Henricksen |
| 2015 | Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems. Berry Schoenmakers, Meilof Veeningen |
| 2015 | Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking. Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik |
| 2015 | Zero-Knowledge Authenticated Order Queries and Order Statistics on a List. Esha Ghosh, Olga Ohrimenko, Roberto Tamassia |
| 2015 | mrPUF: A Novel Memristive Device Based Physical Unclonable Function. Yansong Gao, Damith Chinthana Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott |