| 2017 | A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks. Liron David, Avishai Wool |
| 2017 | A Tool Kit for Partial Key Exposure Attacks on RSA. Atsushi Takayasu, Noboru Kunihiro |
| 2017 | Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection. Michele Orrù, Emmanuela Orsini, Peter Scholl |
| 2017 | An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order. Hannes Groß, Stefan Mangard, Thomas Korak |
| 2017 | Choosing Parameters for NTRUEncrypt. Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang |
| 2017 | Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks. Dingding Jia, Xianhui Lu, Bao Li |
| 2017 | Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves. Marc Joye, Benoît Libert |
| 2017 | Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme. Jakub Breier, Xiaolu Hou |
| 2017 | Full Disk Encryption: Bridging Theory and Practice. Louiza Khati, Nicky Mouha, Damien Vergnaud |
| 2017 | Gauss Sieve Algorithm on GPUs. Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, Chen-Mou Cheng |
| 2017 | Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware. Pascal Sasdrich, Amir Moradi, Tim Güneysu |
| 2017 | Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC. Christoph Dobraunig, Eik List |
| 2017 | Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise. Noboru Kunihiro, Yuki Takahashi |
| 2017 | Low-Leakage Secure Search for Boolean Expressions. Fernando Krell, Gabriela F. Ciocarlie, Ashish Gehani, Mariana Raykova |
| 2017 | My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses. Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma |
| 2017 | New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. Yohei Watanabe, Keita Emura, Jae Hong Seo |
| 2017 | On the Entropy of Oscillator-Based True Random Number Generators. Yuan Ma, Jingqiang Lin, Jiwu Jing |
| 2017 | Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World. Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook |
| 2017 | Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin. Ren Zhang, Bart Preneel |
| 2017 | Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption. Eik List, Mridul Nandi |
| 2017 | Ridge-Based Profiled Differential Power Analysis. Weijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang |
| 2017 | Surnaming Schemes, Fast Verification, and Applications to SGX Technology. Dan Boneh, Shay Gueron |
| 2017 | Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers. Praveen Kumar Vadnala |
| 2017 | Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings Helena Handschuh |
| 2017 | WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction. Jihoon Cho, Kyu Young Choi, Itai Dinur, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg |
| 2017 | Weak Keys for AEZ, and the External Key Padding Attack. Bart Mennink |