You can download the presentations here.
02 - Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes
Konstantinos LIMNIOTIS, Nicholas KOLOKOTRONIS
03 - Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes
Yuri BORISSOV, Peter BOYVALENKOV, Robert TSENKOV
07 - Synchronous Universally Composable Computer Networks
Dirk ACHENBACH, Jörn MÜLLER-QUADE, Jochen RILL
15 - Key-policy Attribute-based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps
Catalin DRAGAN, Ferucio Laurentiu TIPLEA
18 - Extended Functionality in Verifiable Searchable Encryption
Sarah Louise RENWICK, Christian JANSON, James ALDERMAN, Keith MARTIN
20 - Time-Success Ratios under Simple Transformations: Analysis and Applications
Maciej SKORSKI
21 - Cryptographically Strong S-boxes Generated by Modified Immune Algorithm
Georgi IVANOV, Svetla NIKOVA, Nikolay NIKOLOV
22 - Analysis of the Authenticated Cipher MORUS
Aleksandra MILEVA, Vesna DIMITROVA, Vesselin VELICHKOV
23 - On the Efficient Arithmetic for Lattice-Based Cryptography on GPU Using the CUDA Platform
Sedat AKLEYLEK, Zaliha Yuce TOK, Ozgur DAGDELEN
24 - Results on characterizations of vectorial Bent and Plateaued Functions in arbitrary characteristic p
Sihem MESNAGER, Ferruh ÖZBUDAK, Ahmet SINAK
26 - Closing the Gap: A Universal Privacy Framework for Outsourced Data
Dirk ACHENBACH, Matthias HUBER, Jörn MÜLLER-QUADE, Jochen RILL
27 - cuHE: A Homomorphic Encryption Accelerator Library
Wei DAI, Berk SUNAR