20 | -- | 0 | Morten Øygarden, Patrick Felke, Håvard Raddum. * |
21 | -- | 0 | Navid Alamati, Sikhar Patranabis. Cryptographic Primitives with Hinting Property |
22 | -- | 0 | Fuyuki Kitagawa, Ryo Nishimaki. Watermarking PRFs and PKE Against Quantum Adversaries |
23 | -- | 0 | Shuichi Katsumata, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa. Compact NIZKs from Standard Assumptions on Bilinear Maps |
24 | -- | 0 | Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi 0001. Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors |
25 | -- | 0 | Noam Mazor, Jiapeng Zhang. Simple Constructions from (Almost) Regular One-Way Functions |
26 | -- | 0 | Lior Rotem, Gil Segev 0001. Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\varvec{\Sigma }$-Protocols |
27 | -- | 0 | Victor Shoup, Nigel P. Smart. Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience |
28 | -- | 0 | Chris Peikert, Zachary Pepin. Algebraically Structured LWE, Revisited |
29 | -- | 0 | David Derler, Kai Samelin, Daniel Slamanig. Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes |
30 | -- | 0 | Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss. The Price of Active Security in Cryptographic Protocols |
31 | -- | 0 | Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen 0001. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency |
32 | -- | 0 | Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir. The Retracing Boomerang Attack, with Application to Reduced-Round AES |