| 2018 | 3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval. Stanislaw Jarecki, Boyang Wei |
| 2018 | A Cryptographic Analysis of the WireGuard Protocol. Benjamin Dowling, Kenneth G. Paterson |
| 2018 | Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices. Xavier Boyen, Qinyi Li |
| 2018 | Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings Bart Preneel, Frederik Vercauteren |
| 2018 | Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric. Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik |
| 2018 | Best of Both Worlds in Secure Computation, with Low Communication Overhead. Daniel Genkin, S. Dov Gordon, Samuel Ranellucci |
| 2018 | Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks. Serge Vaudenay, Damian Vizár |
| 2018 | Continuously Non-malleable Codes with Split-State Refresh. Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi |
| 2018 | Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures. Johannes Blömer, Jan Bobolz |
| 2018 | Differential Cryptanalysis of Round-Reduced Sparx-64/128. Ralph Ankele, Eik List |
| 2018 | Distributed SSH Key Management with Proactive RSA Threshold Signatures. Yotam Harchol, Ittai Abraham, Benny Pinkas |
| 2018 | DogFish: Decentralized Optimistic Game-theoretic FIle SHaring. Seny Kamara, Alptekin Küpçü |
| 2018 | Drive-By Key-Extraction Cache Attacks from Portable Code. Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom |
| 2018 | Efficient Unconditionally Secure Signatures Using Universal Hashing. Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson |
| 2018 | Floppy-Sized Group Signatures from Lattices. Cecilia Boschini, Jan Camenisch, Gregory Neven |
| 2018 | Formal Analysis of Distance Bounding with Secure Hardware. Handan Kilinç, Serge Vaudenay |
| 2018 | Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations. Jean-Sébastien Coron |
| 2018 | Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains. F. Betül Durak, Serge Vaudenay |
| 2018 | Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext. Jiangtao Li, Junqing Gong |
| 2018 | In-Region Authentication. Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini |
| 2018 | Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent. Marc Fischlin, Patrick Harasser |
| 2018 | KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks. Ivan Oliveira Nunes, Gene Tsudik |
| 2018 | KangarooTwelve: Fast Hashing Based on Keccak-p. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier |
| 2018 | MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth. Ralph Ankele, Florian Böhl, Simon Friedberger |
| 2018 | Message-Locked Encryption with File Update. Suyash Kandele, Souradyuti Paul |
| 2018 | Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification. Peter Sebastian Nordholt, Meilof Veeningen |
| 2018 | New Protocols for Secure Equality Test and Comparison. Geoffroy Couteau |
| 2018 | Non-interactive Zaps of Knowledge. Georg Fuchsbauer, Michele Orrù |
| 2018 | Nothing Refreshes Like a RePSI: Reactive Private Set Intersection. Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente |
| 2018 | On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography. Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff |
| 2018 | On the Security Notions for Homomorphic Signatures. Dario Catalano, Dario Fiore, Luca Nizzardo |
| 2018 | Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs. Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré |
| 2018 | Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption. Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon |
| 2018 | Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher. Yu Sasaki |
| 2018 | Stateful Multi-client Verifiable Computation. Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann |
| 2018 | Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang |
| 2018 | VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation. Shruti Tople, Soyeon Park, Min Suk Kang, Prateek Saxena |