New Second-Preimage Attacks on Hash Functions Elena AndreevaCharles BouillaguetSĂ©bastien Zimmer OriginalPaper 23 June 2015 Pages: 657 - 696
Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes Itai DinurOrr DunkelmanAdi Shamir OriginalPaper 18 April 2015 Pages: 697 - 728
Unconditionally Anonymous Ring and Mesh Signatures Xavier Boyen OriginalPaper 21 September 2015 Pages: 729 - 774
The \(\mathbb {Q}\)-curve Construction for Endomorphism-Accelerated Elliptic Curves Benjamin Smith OriginalPaper 01 August 2015 Pages: 806 - 832
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions Masayuki AbeMelissa ChaseMiyako Ohkubo OriginalPaper 08 July 2015 Pages: 833 - 878
Toward a Game Theoretic View of Secure Computation Gilad AsharovRan CanettiCarmit Hazay OriginalPaper 14 August 2015 Pages: 879 - 926
Cryptanalysis of Full RIPEMD-128 Franck LandelleThomas Peyrin OriginalPaper 25 August 2015 Pages: 927 - 951