(Those marked with * have been picked.) [Secure Outsourced Database] *Encrypted Databases for Differential Privacy. Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/860 *IntegriDB: Verifiable SQL for Outsourced Databases. Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou. CCS 2015. http://www.ece.umd.edu/~cpap/published/IntegriDB.pdf [Secure Machine Learning] *Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, Joseph Keshet. Usenix Security 2018. https://arxiv.org/abs/1802.04633 *Oblivious Multi-Party Machine Learning on Trusted Processors. Olga Ohrimenko, Felix Schuster, Cedric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa. Usenix Security 2016. https://www.microsoft.com/en-us/research/wp-content/uploads/2016/07/paper.pdf [Secure Multiparty Computation] *Efficient Batched Oblivious PRF with Applications to Private Set Intersection. Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu. CCS 2016. https://ia.cr/2016/799 *Efficient and Secure Comparison for On-Line Auctions. Ivan Damgard, Martin Geisler, Mikkel Krigaard. ACISP 2007. https://doi.org/10.1007/978-3-540-73458-1_30 [Applied Cryptography] *PASTA: PASsword-based Threshold Authentication. Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee. CCS 2018. https://ia.cr/2018/885 *Privacy-Preserving Network Provenance. Yuankai Zhang, Adam O'Neill, Micah Sherr, Wenchao Zhou. VLDB 2017. http://people.cs.georgetown.edu/~adam/ppnp.pdf *Stadium: A Distributed Metadata-Private Messaging System. Nirvan Tyagi, Yossi Gilad, Derek Leung, Matei Zaharia, Nickolai Zeldovich. SOSP 2017. https://ia.cr/2016/943 [Bitcoin / Blockchain] *RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. Shi-Feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu. ESORICS 2017. https://ia.cr/2017/921 *SoK: A Consensus Taxonomy in the Blockchain Era. Juan Garay, Aggelos Kiayias. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/754 [Secure Deletion] Feng Hao, Dylan Clarke, Avelino Francisco Zorzo. *Deleting Secret Data with Public Verifiability. IEEE TPDS 2015. http://ia.cr/2014/364 *BurnBox: Self-Revocable Encryption in a World Of Compelled Access. Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers. Usenix Security 2018. https://ia.cr/2018/638 [Blockchain / Cryptocurrency] Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble. Georg Fuchsbauer, Michele Orr, Yannick Seurin. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/1039 Edrax: A Cryptocurrency with Stateless Transaction Validation. Alexander Chepurnoy, Charalampos Papamanthou, Yupeng Zhang. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/968 A Survey of Two Verifiable Delay Functions. Dan Boneh, Benedikt Bnz, Ben Fisch. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/712 Compact Multi-Signatures for Smaller Blockchains. Dan Boneh, Manu Drijvers, Gregory Neven. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/483 Privacy-preserving Multi-hop Locks for Blockchain Scalability and Interoperability. Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/472 A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence. Bingsheng Zhang, Roman Oliynykov, Hamed Balogun. NDSS 2019. https://ia.cr/2018/435 [Elections] BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme. Pyrros Chaidos, Vronique Cortier, Georg Fuchsbauer, David Galindo. CCS 2016. https://hal.inria.fr/hal-01377917 SoK: A comprehensive analysis of game-based ballot privacy definitions. David Bernhard, Veronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi. IEEE Symposium on Security and Privacy 2015. https://oaklandsok.github.io/papers/bernhard2014.pdf SoK: Verifiability Notions for E-Voting Protocols. Veronique Cortier, David Galindo, Ralf Kusters, Johannes Muller, Tomasz Truderung. IEEE Symposium on Security and Privacy 2016. https://www.ieee-security.org/TC/SP2016/papers/0824a779.pdf Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme. David Bernhard, Oksana Kulyk, Melanie Volkamer. ACM Availability, Reliability and Security (ARES) 2017 https://ia.cr/2016/431 [Encrypted Storage] (Un)linkable Pseudonyms for Governmental Databases. Jan Camenisch, Anja Lehmann. ACM CCS 2015. http://www.zurich.ibm.com/pdf/csc/pseudonyms_paper.pdf [Group/Ring Signatures] Highly-Efficient Fully-Anonymous Dynamic Group Signatures. David Derler, Daniel Slamanig. AsiaCCS 2018. https://ia.cr/2016/154 Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. Vireshwar Kumar, He Li, Jung-Min (Jerry) Park, Kaigui Bian, Yaling Yang. ACM CCS 2015. https://winser.ece.vt.edu/wp-content/uploads/2018/04/group_signatures.pdf Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions. Benoit Libert, Thomas Peters, Moti Yung. Crypto 2015. http://ia.cr/2015/743 Post-Quantum EPID Group Signatures from Symmetric Primitives. Dan Boneh, Saba Eskandarian, Ben Fisch. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/261 [Hardware-Assited Cryptography] Secure Multiparty Computation from SGX. Raad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi. FC 2017. https://ia.cr/2016/1057 Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset. Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz. Privacy Enhancing Technologies Symposium (PETS) 2019. https://ia.cr/2018/247. [Identity/Attribute-Based Encryption] Match Me if You Can: Matchmaking Encryption and its Applications Giuseppe Ateniese, Danilo Francati, David Nuez, Daniele Venturi. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/1094 Registration-Based Encryption from Standard Assumptions. Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/1030 Registration-Based Encryption: Removing Private-Key Generator from IBE. Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi. TCC 2018. https://ia.cr/2018/919 Access Control Encryption for Equality, Comparison, and More. PKC 2017. https://ia.cr/2017/009. Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions. Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee. CCS 2017. https://ia.cr/2017/983 FAME: Fast Attribute-based Message Encryption. Shashank Agrawal, Melissa Chase. CCS 2017. https://ia.cr/2017/807 [Order-Revealing Encryption] Parameter-Hiding Order Revealing Encryption. David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang. AsiaCrypt 2018. https://ia.cr/2018/698 [Key Exchange] Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism. Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He. AsiaCrypt 2018. https://ia.cr/2018/817 [Pseudorandom Functions] A Generic Approach to Constructing and Proving Verifiable Random Functions. Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters. TCC 2017. https://ia.cr/2017/021 Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model. Susan Hohenberger, Venkata Koppula, Brent Waters. AsiaCrypt 2015. http://ia.cr/2014/521 Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong. ACISP 2012. https://ia.cr/2012/213 [Real World Crypto] The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol Jol Alwen, Sandro Coretti, Yevgeniy Dodis IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/1037 [Secure Multi-Party Computation (more)] Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates. Samee Zahur, Mike Rosulek, David Evans. Eurocrypt 2015. https://ia.cr/2014/756 A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority. Yehuda Lindell, Ariel Nof. CCS 2017. https://ia.cr/2017/816 [Searchable Encryption] Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations. Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf. STOC 2016. https://ia.cr/2016/251 Strengthening the Security of Encrypted Databases: Non-Transitive JOINs. Ilya Mironov, Gil Segev, Ido Shahaf. TCC 2017. https://ia.cr/2017/883 Structured Encryption and Leakage Suppression. Seny Kamara, Tarik Moataz, Olga Ohrimenko. Crypto 2018. https://ia.cr/2018/551 SQL on Structurally-Encrypted Databases. Seny Kamara, Tarik Moataz. AsiaCrypt 2018. https://ia.cr/2016/453 Pattern Matching on Encrypted Streams. Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, Olivier Sanders. AsiaCrypt 2018. https://ia.cr/2017148 Encrypted Multi-Maps with Computationally-Secure Leakage. Seny Kamara, Tarik Moataz. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2018/978 [Signatures] Surnaming Schemes, Fast Verification, and Applications to SGX Technology. Dan Boneh, Shay Gueron. CT-RSA 2017. https://doi.org/10.1007/978-3-319-52153-4_9 Structure-Preserving Signatures from Standard Assumptions, Revisited. Eike Kiltz, Jiaxin Pan, Hoeteck Wee. Crypto 2015. http://ia.cr/2015/604 Subversion-Resilient Signature Schemes. Giuseppe Ateniese, Bernardo Magri, Daniele Venturi. ACM CCS 2015. http://ia.cr/2015/517 EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes. Georg Fuchsbauer, Christian Hanser, Daniel Slamanig. IACR Cryptology ePrint Archive. http://eprint.iacr.org/2014/944 [Symmetric-Key Encryption] KEM Combiners. Federico Giacon, Felix Heuer, Bertram Poettering. PKC 2018. https://ia.cr/2018/024 DiSE: Distributed Symmetric-key Encryption. Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal. CCS 2018. https://ia.cr/2018/727 [TLS] Zero Round-Trip Time for the Extended Access Control Protocol. Jacqueline Brendel, Marc Fischlin. European Symposium on Research in Computer Security (ESORICS 2017) https://ia.cr/2017/060 0-RTT Key Exchange with Full Forward Secrecy. Felix Gnther, Britta Hale, Tibor Jager, Sebastian Lauer. Eurocrypt 2017. https://ia.cr/2017/223 [Zero-Knowledge Proofs] Bulletproofs: Efficient Range Proofs for Confidential Transactions. Benedikt Bunz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Greg Maxwell IEEE Security & Privacy 2018. http://web.stanford.edu/~buenz/pubs/bulletproofs.pdf An Expressive (Zero-Knowledge) Set Accumulator. Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou. IEEE European Symposium on Security and Privacy (EuroS&P) 2017. http://www.umiacs.umd.edu/~zhangyp/papers/accum.pdf DIZK: A Distributed Zero Knowledge Proof System. Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica. USENIX Security 2018. https://ia.cr/2018/691 [Anonymous Credential] Delegatable Anonymous Credentials from Mercurial Signatures. Elizabeth C. Crites, Anna Lysyanskaya. CT-RSA 2019. To appear. https://ia.cr/2018/923 Accumulators with Applications to Anonymity-Preserving Revocation. Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov. IEEE European Symposium on Security and Privacy 2017. https://ia.cr/2017/043 Anonymous Attestation with Subverted TPMs. Jan Camenisch, Manu Drijvers, Anja Lehmann. Crypto 2017. https://ia.cr/2017/200 One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian. IEEE Security & Privacy 2017. https://ia.cr/2017/639