The papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections including: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based and system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks.
The papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections including: lattic...