| 2019 | Accountable Tracing Signatures from Lattices. San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu |
| 2019 | An Improved RNS Variant of the BFV Homomorphic Encryption Scheme. Shai Halevi, Yuriy Polyakov, Victor Shoup |
| 2019 | Assessment of the Key-Reuse Resilience of NewHope. Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi |
| 2019 | Automatic Search for a Variant of Division Property Using Three Subsets. Kai Hu, Meiqin Wang |
| 2019 | Constructing TI-Friendly Substitution Boxes Using Shift-Invariant Permutations. Si Gao, Arnab Roy, Elisabeth Oswald |
| 2019 | Context Hiding Multi-key Linearly Homomorphic Authenticators. Lucas Schabhüser, Denis Butin, Johannes Buchmann |
| 2019 | Delegatable Anonymous Credentials from Mercurial Signatures. Elizabeth C. Crites, Anna Lysyanskaya |
| 2019 | Doubly Half-Injective PRGs for Incompressible White-Box Cryptography. Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels |
| 2019 | Downgradable Identity-Based Encryption and Applications. Olivier Blazy, Paul Germouty, Duong Hieu Phan |
| 2019 | EPIC: Efficient Private Image Classification (or: Learning from the Masters). Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren |
| 2019 | Efficient Fully-Leakage Resilient One-More Signature Schemes. Antonio Faonio |
| 2019 | Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality. Manuel Barbosa, Dario Catalano, Azam Soleimanian, Bogdan Warinschi |
| 2019 | Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party Computation. Nigel P. Smart, Tim Wood |
| 2019 | Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks. Mark Abspoel, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede |
| 2019 | Large Universe Subset Predicate Encryption Based on Static Assumption (Without Random Oracle). Sanjit Chatterjee, Sayantan Mukherjee |
| 2019 | Linking Stam's Bounds with Generalized Truncation. Bart Mennink |
| 2019 | Lossy Trapdoor Permutations with Improved Lossiness. Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen |
| 2019 | MILP-Based Differential Attack on Round-Reduced GIFT. Baoyu Zhu, Xiaoyang Dong, Hongbo Yu |
| 2019 | New Techniques for Multi-value Input Homomorphic Evaluation and Applications. Sergiu Carpov, Malika Izabachène, Victor Mollimard |
| 2019 | Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling. Liron David, Avishai Wool |
| 2019 | Post-quantum EPID Signatures from Symmetric Primitives. Dan Boneh, Saba Eskandarian, Ben Fisch |
| 2019 | Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks. Suvradip Chakraborty, C. Pandu Rangan |
| 2019 | Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers. Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata |
| 2019 | Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation. Liang Zhao |
| 2019 | Robust Encryption, Extended. Rémi Géraud, David Naccache, Razvan Rosie |
| 2019 | Structure-Preserving Certificateless Encryption and Its Application. Tao Zhang, Huangting Wu, Sherman S. M. Chow |
| 2019 | Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model. Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi |
| 2019 | Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings Mitsuru Matsui |
| 2019 | Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki |