| 2015 | A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer. Shota Goto, Junji Shikata |
| 2015 | A Leakage Resilient MAC. Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wójcik |
| 2015 | A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials. David Derler, Christian Hanser, Daniel Slamanig |
| 2015 | Bent and Semi-bent Functions via Linear Translators. Nese Koçak, Sihem Mesnager, Ferruh Özbudak |
| 2015 | Codes of Length 2 Correcting Single Errors of Limited Size. Torleiv Kløve |
| 2015 | Comparison of Cube Attacks Over Different Vector Spaces. Richard Winter, Ana Salagean, Raphael C.-W. Phan |
| 2015 | Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Janaka Alawatugoda, Douglas Stebila, Colin Boyd |
| 2015 | Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings Jens Groth |
| 2015 | Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. Giuseppe Ateniese, Antonio Faonio, Seny Kamara |
| 2015 | MI-T-HFE, A New Multivariate Signature Scheme. Wenbin Zhang, Chik How Tan |
| 2015 | On Existence (Based on an Arithmetical Problem) and Constructions of Bent Functions. Sihem Mesnager, Gérard D. Cohen, David Madore |
| 2015 | On the Diffusion Property of Iterated Functions. Jian Liu, Sihem Mesnager, Lusheng Chen |
| 2015 | On the Doubly Sparse Compressed Sensing Problem. Grigory Kabatiansky, Serge G. Vladut, Cédric Tavernier |
| 2015 | Robust Authenticated Encryption and the Limits of Symmetric Cryptography. Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann |
| 2015 | Rogue Decryption Failures: Reconciling AE Robustness Notions. Guy Barwell, Daniel Page, Martijn Stam |
| 2015 | Security Against Related Randomness Attacks via Reconstructive Extractors. Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee |
| 2015 | Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint. Maciej Skórski |
| 2015 | Soft Distance Metric Decoding of Polar Codes. Mónica C. Liberatori, Leonardo J. Arnone, Jorge Castiñeira Moreira, Patrick Guy Farrell |
| 2015 | Tweak-Length Extension for Tweakable Blockciphers. Kazuhiko Minematsu, Tetsu Iwata |
| 2015 | Zero-Knowledge Interactive Proof Systems for New Lattice Problems. Claude Crépeau, Raza Ali Kazmi |