| 2017 | A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium. Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini |
| 2017 | A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords. Weizhi Meng, Wenjuan Li, Lee Wang Hao, Lijun Jiang, Jianying Zhou |
| 2017 | A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers. Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma |
| 2017 | Accountable Storage. Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia |
| 2017 | Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model). David Bernhard, Ngoc Khanh Nguyen, Bogdan Warinschi |
| 2017 | Almost Optimal Oblivious Transfer from QA-NIZK. Olivier Blazy, Céline Chevalier, Paul Germouty |
| 2017 | An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis. Sze Ling Yeo, Zhen Li, Khoongming Khoo, Yu Bin Low |
| 2017 | An Experimental Study of the BDD Approach for the Search LWE Problem. Rui Xu, Sze Ling Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen |
| 2017 | Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi |
| 2017 | Are You Lying: Validating the Time-Location of Outdoor Images. Xiaopeng Li, Wenyuan Xu, Song Wang, Xianshan Qu |
| 2017 | Bounds in Various Generalized Settings of the Discrete Logarithm Problem. Jason H. M. Ying, Noboru Kunihiro |
| 2017 | Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols. Ronghai Yang, Wing Cheong Lau, Shangcheng Shi |
| 2017 | Efficiently Obfuscating Re-Encryption Program Under DDH Assumption. Akshayaram Srinivasan, Chandrasekaran Pandu Rangan |
| 2017 | Faster Secure Multi-party Computation of AES and DES Using Lookup Tables. Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek |
| 2017 | Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. Russell W. F. Lai, Sherman S. M. Chow |
| 2017 | Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security. Yi-Ruei Chen, Wen-Guey Tzeng |
| 2017 | Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes. Dan Boneh, Sam Kim, Valeria Nikolaenko |
| 2017 | Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease. San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu |
| 2017 | Legacy-Compliant Data Authentication for Industrial Control System Traffic. John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer, Martín Ochoa |
| 2017 | Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks. Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik |
| 2017 | Maliciously Secure Multi-Client ORAM. Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder |
| 2017 | More Efficient Construction of Bounded KDM Secure Encryption. Kaoru Kurosawa, Rie Habuka |
| 2017 | Multi-client Oblivious RAM Secure Against Malicious Servers. Erik-Oliver Blass, Travis Mayberry, Guevara Noubir |
| 2017 | No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices. Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran |
| 2017 | OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. Daniel Demmler, Marco Holz, Thomas Schneider |
| 2017 | Related-Key Impossible-Differential Attack on Reduced-Round Skinny. Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang |
| 2017 | SCRAPE: Scalable Randomness Attested by Public Entities. Ignacio Cascudo, Bernardo David |
| 2017 | Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography. Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Ricosset |
| 2017 | Secure and Efficient Pairing at 256-Bit Security Level. Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi |
| 2017 | Side-Channel Attacks Meet Secure Network Protocols. Alex Biryukov, Daniel Dinu, Yann Le Corre |
| 2017 | Signature Schemes with Randomized Verification. Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, Brent Waters |
| 2017 | Simple Security Definitions for and Constructions of 0-RTT Key Exchange. Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk |
| 2017 | TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF. Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu |
| 2017 | Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience. Claude Carlet, Annelie Heuser, Stjepan Picek |
| 2017 | cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations. David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman |