Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks Naofumi HommaYu-ichi HayashiTakafumi Aoki OriginalPaper 17 December 2015 Pages: 373 - 391
Acoustic Cryptanalysis Daniel GenkinAdi ShamirEran Tromer OriginalPaper 08 February 2016 Pages: 392 - 443
Secret-Sharing for NP Ilan KomargodskiMoni NaorEylon Yogev OriginalPaper 14 January 2016 Pages: 444 - 469
Security of Blind Signatures Revisited Dominique SchröderDominique Unruh OriginalPaper 14 January 2016 Pages: 470 - 494
The Security of Tandem-DM in the Ideal Cipher Model Jooyoung LeeMartijn StamJohn Steinberger OriginalPaper 21 March 2016 Pages: 495 - 518
Efficient Cryptosystems From \(\mathbf{2}^{{\varvec{k}}}\)-th Power Residue Symbols Fabrice BenhamoudaJavier HerranzBenoît Libert OriginalPaper 26 April 2016 Pages: 519 - 549
Photonic Side-Channel Analysis of Arbiter PUFs Shahin TajikEnrico DietzHeinz-Wilhelm Hübers OriginalPaper 13 April 2016 Pages: 550 - 571
Jacobian Coordinates on Genus 2 Curves Huseyin HisilCraig Costello OriginalPaper 15 March 2016 Pages: 572 - 600