| 2015 | A Formal Dynamic Verification of Choreographed Web Services Conversations. Karim Dahmani, Mahjoub Langar, Riadh Robbana |
| 2015 | An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure. Noboru Kunihiro |
| 2015 | Attribute-Based Encryption Resilient to Auxiliary Input. Zhiwei Wang, Siu-Ming Yiu |
| 2015 | Attribute-Based Encryption for Finite Automata from LWE. Xavier Boyen, Qinyi Li |
| 2015 | Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann |
| 2015 | BetterTimes - Privacy-Assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields. Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld |
| 2015 | Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao |
| 2015 | Constrained Verifiable Random Functions from Indistinguishability Obfuscation. Bei Liang, Hongda Li, Jinyong Chang |
| 2015 | Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage. Yohei Watanabe, Junji Shikata |
| 2015 | Efficient Key Authentication Service for Secure End-to-End Communications. Mohammad Etemad, Alptekin Küpçü |
| 2015 | Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries. Sumit Kumar Debnath, Ratna Dutta |
| 2015 | Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols. Bernardo Machado David, Rafael Dowsley, Raj S. Katti, Anderson C. A. Nascimento |
| 2015 | Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction. Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan |
| 2015 | From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions. Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges |
| 2015 | Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher. Yusuke Naito |
| 2015 | Functional Signcryption: Notion, Construction, and Applications. Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
| 2015 | Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach. Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen |
| 2015 | Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards. Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto |
| 2015 | On Privacy for RFID. Serge Vaudenay |
| 2015 | On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers. Maciej Skorski |
| 2015 | PPAE: Practical Parazoa Authenticated Encryption Family. Donghoon Chang, Sumesh Manjunath R., Somitra Kumar Sanadhya |
| 2015 | Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings Man Ho Au, Atsuko Miyaji |
| 2015 | Provably Secure Identity Based Provable Data Possession. Yong Yu, Yafang Zhang, Yi Mu, Willy Susilo, Hongyu Liu |
| 2015 | Reset-Secure Identity-Based Identification Schemes Without Pairings. Ji-Jian Chin, Hiroaki Anada, Syh-Yuan Tan |
| 2015 | Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes. David Derler, Daniel Slamanig |
| 2015 | Sound Proof of Proximity of Knowledge. Serge Vaudenay |
| 2015 | Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders. Katsuyuki Takashima, Atsushi Takayasu |
| 2015 | Unique Signature with Short Output from CDH Assumption. Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng |