Abstract is missing.
- A Forkcipher-Based Pseudo-Random Number GeneratorElena Andreeva 0001, Andreas Weninger. 3-31 [doi]
- DMA'n'Play: Practical Remote Attestation Based on Direct Memory AccessSebastian Surminski, Christian Niesler, Lucas Davi, Ahmad-Reza Sadeghi. 32-61 [doi]
- Recommendation for a Holistic Secure Embedded ISA ExtensionFlorian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu. 62-84 [doi]
- QuantumCharge: Post-Quantum Cryptography for Electric Vehicle ChargingDustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen. 85-111 [doi]
- Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear ComplexitiesYongfeng Xu, Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou. 115-142 [doi]
- Predicate Private Set Intersection with Linear ComplexityYaxi Yang, Jian Weng 0001, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou 0001. 143-166 [doi]
- A Framework for UC Secure Privacy Preserving Biometric Authentication Using Efficient Functional EncryptionJohannes Ernst, Aikaterini Mitrokotsa. 167-196 [doi]
- Private Information Retrieval with Result Verification for More ServersPengzhen Ke, Liang Feng Zhang. 197-216 [doi]
- Practical Robust DKG Protocols for CSIDHShahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen. 219-247 [doi]
- Efficient Isogeny Proofs Using Generic TechniquesKelong Cong, Yi-Fu Lai, Shai Levin. 248-275 [doi]
- Low Memory Attacks on Small Key CSIDHJesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May 0001. 276-304 [doi]
- On the Complete Non-malleability of the Fujisaki-Okamoto TransformDaniele Friolo, Matteo Salvino, Daniele Venturi 0001. 307-335 [doi]
- Optimal Security Notion for Decentralized Multi-Client Functional EncryptionKy Nguyen, Duong Hieu Phan, David Pointcheval. 336-365 [doi]
- Anonymous (Hierarchical) Identity-Based Encryption from Broader AssumptionsHuangting Wu, Sherman S. M. Chow. 366-395 [doi]
- Publicly Auditable Functional EncryptionVlasis Koutsos, Dimitrios Papadopoulos 0001. 396-425 [doi]
- Robustly Reusable Fuzzy Extractors in a Post-quantum WorldAmit Deo, Charlie Grover. 429-459 [doi]
- Subversion-Resilient Authenticated Encryption Without Random OraclesPascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth 0001, Tibor Jager. 460-483 [doi]
- Scored Anonymous CredentialsSherman S. M. Chow, Jack P. K. Ma, Tsz Hon Yuen. 484-515 [doi]
- GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key ExchangesHugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi. 516-538 [doi]
- Explicit and Nearly Tight Lower Bound for 2-Party Perfectly Secure FSSKeitaro Hiwatashi, Koji Nuida. 541-554 [doi]
- Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash FunctionsMichele Ciampi, Yu Xia. 555-581 [doi]
- Game-Theoretically Secure Protocols for the Ordinal Random Assignment ProblemT.-H. Hubert Chan, Ting Wen, Hao Xie, Quan Xue. 582-610 [doi]
- A New Approach to Garbled CircuitsAnasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay, Avishay Yanai. 611-641 [doi]
- Mt. Random: Multi-tiered Randomness BeaconsIgnacio Cascudo, Bernardo David, Omer Shlomovits, Denis Varlakov. 645-674 [doi]
- Revisiting Transaction Ledger Robustness in the Miner Extractable Value EraFredrik Kamphuis, Bernardo Magri, Ricky Lamberty, Sebastian Faust. 675-698 [doi]
- An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet AppsI Wayan Budi Sentana, Muhammad Ikram 0001, Mohamed Ali Kâafar. 699-725 [doi]