| 2015 | Automatic Search for Linear Trails of the SPECK Family. Yuan Yao, Bin Zhang, Wenling Wu |
| 2015 | Bit Error Probability Evaluation of RO PUFs. Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing |
| 2015 | Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model. Masayuki Fukumitsu, Shingo Hasegawa |
| 2015 | CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency. Zhiwei Wang, Siu-Ming Yiu |
| 2015 | Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications. Aggelos Kiayias, Ozgur Oksuz, Qiang Tang |
| 2015 | Dynamically Provisioning Isolation in Hierarchical Architectures. Kevin Falzon, Eric Bodden |
| 2015 | Efficient Ephemeral Elliptic Curve Cryptographic Keys. Andrea Miele, Arjen K. Lenstra |
| 2015 | Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis. Siwei Sun, Lei Hu, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma, Ling Song, Jinyong Shan |
| 2015 | Extracting Robust Keys from NAND Flash Physical Unclonable Functions. Shijie Jia, Luning Xia, Zhan Wang, Jingqiang Lin, Guozhu Zhang, Yafei Ji |
| 2015 | Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study. Lotfi Ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker, Philip Miseldine |
| 2015 | From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour. Pierre Karpman |
| 2015 | GPU-Disasm: A GPU-Based X86 Disassembler. Evangelos Ladakis, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis, Georgios Portokalidis |
| 2015 | General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps. Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
| 2015 | Graded Signatures. Aggelos Kiayias, Murat Osmanoglu, Qiang Tang |
| 2015 | Hashing into Jacobi Quartic Curves. Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian |
| 2015 | Improvement of Multi-bit Information Embedding Algorithm for Palette-Based Images. Anu Aryal, Kazuma Motegi, Shoko Imaizumi, Naokazu Aoki |
| 2015 | Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings Javier López, Chris J. Mitchell |
| 2015 | Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes. Massimo Chenal, Qiang Tang |
| 2015 | Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures. Fuqun Wang, Kunpeng Wang, Bao Li, Yuanyuan Gao |
| 2015 | Multi-user Searchable Encryption in the Cloud. Cédric Van Rompay, Refik Molva, Melek Önen |
| 2015 | Multipath TCP IDS Evasion and Mitigation. Zeeshan Afzal, Stefan Lindskog |
| 2015 | Oblivious PAKE: Efficient Handling of Password Trials. Franziskus Kiefer, Mark Manulis |
| 2015 | On Security of a White-Box Implementation of SHARK. Yang Shi, Hongfei Fan |
| 2015 | On the Efficiency of Multi-party Contract Signing Protocols. Gerard Draper-Gil, Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos, Jianying Zhou |
| 2015 | On the Provable Security of the Dragonfly Protocol. Jean Lancrenon, Marjan Skrobot |
| 2015 | Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage. Xinyu Fan, Vijay Varadharajan, Michael Hitchens |
| 2015 | Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage. Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer |
| 2015 | Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter. Sumit Kumar Debnath, Ratna Dutta |
| 2015 | Software Security Maturity in Public Organisations. Martin Gilje Jaatun, Daniela S. Cruzes, Karin Bernsmed, Inger Anne Tøndel, Lillian Røstad |
| 2015 | The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures. Bei Liang, Hongda Li, Jinyong Chang |
| 2015 | Two Generic Methods of Analyzing Stream Ciphers. Lin Jiao, Bin Zhang, Mingsheng Wang |