| 2015 | A Simple and Improved Algorithm for Integer Factorization with Implicit Hints. Koji Nuida, Naoto Itakura, Kaoru Kurosawa |
| 2015 | Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger |
| 2015 | Cache Storage Attacks. Billy Bob Brumley |
| 2015 | Cold Boot Attacks in the Discrete Logarithm Setting. Bertram Poettering, Dale L. Sibborn |
| 2015 | Communication Optimal Tardos-Based Asymmetric Fingerprinting. Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang |
| 2015 | Completeness of Single-Bit Projection-KDM Security for Public Key Encryption. Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka |
| 2015 | Cryptanalysis of Ascon. Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer |
| 2015 | Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings. Nuttapong Attrapadung, Shota Yamada |
| 2015 | Efficient Leakage Resilient Circuit Compilers. Marcin Andrychowicz, Ivan Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou |
| 2015 | Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace. Neil Hanley, HeeSeok Kim, Michael Tunstall |
| 2015 | Finding Shortest Lattice Vectors in the Presence of Gaps. Wei Wei, Mingjie Liu, Xiaoyun Wang |
| 2015 | Format Oracles on OpenPGP. Florian Maury, Jean-René Reinhard, Olivier Levillain, Henri Gilbert |
| 2015 | Hash Functions from Defective Ideal Ciphers. Jonathan Katz, Stefan Lucks, Aishwarya Thiruvengadam |
| 2015 | Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON. Junwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu |
| 2015 | How to Incorporate Associated Data in Sponge-Based Authenticated Encryption. Yu Sasaki, Kan Yasuda |
| 2015 | Implementing GCM on ARMv8. Conrado Porto Lopes Gouvêa, Julio López |
| 2015 | Improved Attacks on Reduced-Round Camellia-128/192/256. Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang |
| 2015 | Just a Little Bit More. Joop van de Pol, Nigel P. Smart, Yuval Yarom |
| 2015 | Linearly Homomorphic Encryption from $$\mathsf {DDH}$$. Guilhem Castagnos, Fabien Laguillaumie |
| 2015 | Non-Interactive Zero-Knowledge Proofs of Non-Membership. Olivier Blazy, Céline Chevalier, Damien Vergnaud |
| 2015 | Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation. Handan Kilinç, Alptekin Küpçü |
| 2015 | Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption. Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura |
| 2015 | Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives. David Derler, Christian Hanser, Daniel Slamanig |
| 2015 | Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts. Jae Hong Seo, Keita Emura |
| 2015 | Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions. Essam Ghadafi |
| 2015 | Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings Kaisa Nyberg |
| 2015 | Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication. Yusi Zhang |