Abstract is missing.
- CryptoZoo: A Viewer for Reduction ProofsChris Brzuska, Christoph Egger 0001, Kirthivaasan Puniamurthy. 3-25 [doi]
- Element Distinctness and Bounded Input Size in Private Set Intersection and Related ProtocolsXavier Carpent, Seoyeon Hwang, Gene Tsudik. 26-57 [doi]
- A New Approach to Efficient and Secure Fixed-Point ComputationTore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, Anne Dorte Spangsberg. 58-87 [doi]
- Auditable Attribute-Based Credentials Scheme and Its Application in Contact TracingPengfei Wang, Xiangyu Su, Mario Larangeira, Keisuke Tanaka. 88-118 [doi]
- Verification Protocol for Stable Matching from Conditional Disclosure of SecretsKittiphop Phalakarn, Toru Nakamura. 119-134 [doi]
- Non-malleable Fuzzy ExtractorsDanilo Francati, Daniele Venturi 0001. 135-155 [doi]
- Upgrading Fuzzy ExtractorsChloé Cachet, Ariel Hamlin, Maryam Rezapour, Benjamin Fuller 0001. 156-182 [doi]
- X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained DevicesEdoardo Liberati, Alessandro Visintin, Riccardo Lazzeretti, Mauro Conti, A. Selcuk Uluagac. 183-210 [doi]
- Efficient Clustering on Encrypted DataMengyu Zhang, Long Wang, Xiaoping Zhang, Zhuotao Liu, Yisong Wang, Han Bao. 213-236 [doi]
- Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword SearchKeita Emura. 237-256 [doi]
- Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable ElectionsThi Van Thao Doan, Olivier Pereira, Thomas Peters. 257-287 [doi]
- Two-Party Decision Tree Training from Updatable Order-Revealing EncryptionRobin Berger, Felix Dörre, Alexander Koch 0001. 288-317 [doi]
- KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and MoreYusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001. 318-347 [doi]
- Subversion-Resilient Signatures Without Random OraclesPascal Bemmann, Sebastian Berndt 0001, Rongmao Chen. 351-375 [doi]
- Practical Lattice-Based Distributed Signatures for a Small Number of SignersNabil Alkeilani Alkadri, Nico Döttling, Sihang Pu. 376-402 [doi]
- Building MPCitH-Based Signatures from MQ, MinRank, and Rank SDThibauld Feneuil. 403-431 [doi]
- Exploring SIDH-Based Signature ParametersAndrea Basso 0002, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, Gustave Tchoffo Saah. 432-456 [doi]
- Biscuit: New MPCitH Signature Scheme from Structured Multivariate PolynomialsLuk Bettale, Delaram Kahrobaei, Ludovic Perret, Javier A. Verbel. 457-486 [doi]