The 26 full papers were carefully reviewed and selected from 74 submissions. They are organized in topical sections as follows:
Part I: Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes; Elliptic curves, Zero-knowledge proof, Signatures; Attacks.
Part II: Secure computation, Algorithm hardness, Privacy; Post-quantum cryptography.