| 2018 | Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation. Momonari Kudo, Yuki Yokota, Yasushi Takahashi, Masaya Yasuda |
| 2018 | Adaptive-Secure VRFs with Shorter Keys from Static Assumptions. Razvan Rosie |
| 2018 | Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes. Paolo Santini, Marco Baldi, Franco Chiaraluce |
| 2018 | Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project. Zhen Liu, Yanbin Pan, Tianyuan Xie |
| 2018 | CLEF: Limiting the Damage Caused by Large Flows in the Internet Core. Hao Wu, Hsu-Chun Hsiao, Daniele Enrico Asoni, Simon Scherrer, Adrian Perrig, Yih-Chun Hu |
| 2018 | Code-Based Signature Schemes from Identification Protocols in the Rank Metric. Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Víctor Mateu |
| 2018 | Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach. Varsha Bhat Kukkala, S. R. S. Iyengar |
| 2018 | Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework. Kamalesh Acharya, Ratna Dutta |
| 2018 | Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings Jan Camenisch, Panos Papadimitratos |
| 2018 | DNS-DNS: DNS-Based De-NAT Scheme. Liran Orevi, Amir Herzberg, Haim Zlatokrilov |
| 2018 | Enhanced Security of Attribute-Based Signatures. Johannes Blömer, Fabian Eidens, Jakob Juhnke |
| 2018 | Extending a Framework for Biometric Visual Cryptography. Koray Karabina, Angela Robinson |
| 2018 | Faster Privacy-Preserving Location Proximity Schemes. Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang |
| 2018 | Hierarchical Attribute-Based Signatures. Constantin Catalin Dragan, Daniel Gardham, Mark Manulis |
| 2018 | Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption. Masahito Ishizaka, Kanta Matsuura |
| 2018 | Inside GandCrab Ransomware. Yassine Lemmou, El Mamoun Souidi |
| 2018 | Malware Tolerant (Mesh-)Networks. Michael Denzel, Mark Dermot Ryan |
| 2018 | On the Efficiency of ZMAC-Type Modes. Yusuke Naito |
| 2018 | Protean Signature Schemes. Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig |
| 2018 | SETLA: Signature and Encryption from Lattices. François Gérard, Keno Merckx |
| 2018 | Secret Sharing Schemes for (k, n)-Consecutive Access Structures. Javier Herranz, Germán Sáez |
| 2018 | Several MILP-Aided Attacks Against SNOW 2.0. Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii |
| 2018 | Solving LWR via BDD Strategy: Modulus Switching Approach. Huy Quoc Le, Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda |
| 2018 | The Relation Between CENC and NEMO. Bart Mennink |
| 2018 | Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Processing Pipeline. Donald Nokam Kuate, Sébastien Canard, Renaud Sirdey |
| 2018 | \mathsf HIKE : Walking the Privacy Trail. Elena Pagnin, Carlo Brunetta, Pablo Picazo-Sanchez |