Abstract is missing.
- Kummer for Genus One over Prime Order FieldsSabyasachi Karati, Palash Sarkar. 3-32 [doi]
- ABE with Tag Made Easy - Concise Framework and New Instantiations in Prime-Order GroupsJie Chen 0021, Junqing Gong. 35-65 [doi]
- Towards a Classification of Non-interactive Computational Assumptions in Cyclic GroupsEssam Ghadafi, Jens Groth. 66-96 [doi]
- An Efficient Pairing-Based Shuffle ArgumentPrastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac 0001. 97-127 [doi]
- Efficient Ring Signatures in the Standard ModelGiulio Malavolta, Dominique Schröder. 128-157 [doi]
- Grover Meets Simon - Quantumly Attacking the FX-constructionGregor Leander, Alexander May 0001. 161-178 [doi]
- Quantum Multicollision-Finding AlgorithmAkinori Hosoyamada, Yu Sasaki, Keita Xagawa. 179-210 [doi]
- An Efficient Quantum Collision Search Algorithm and Implications on Symmetric CryptographyAndré Chailloux, María Naya-Plasencia, André Schrottenloher. 211-240 [doi]
- Quantum Resource Estimates for Computing Elliptic Curve Discrete LogarithmsMartin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin E. Lauter. 241-270 [doi]
- qDSA: Small and Secure Digital Signatures with Curve-Based Diffie-Hellman Key PairsJoost Renes, Benjamin Smith. 273-302 [doi]
- A Simple and Compact Algorithm for SIDH with Arbitrary Degree IsogeniesCraig Costello, Hüseyin Hisil. 303-329 [doi]
- Faster Algorithms for Isogeny Problems Using Torsion Point ImagesChristophe Petit. 330-353 [doi]
- Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of SpaceHamza Abusalah, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, Leonid Reyzin. 357-379 [doi]
- The Sleepy Model of ConsensusRafael Pass, Elaine Shi. 380-409 [doi]
- Instantaneous Decentralized PokerIddo Bentov, Ranjit Kumaresan, Andrew Miller. 410-440 [doi]
- More Efficient Universal Circuit ConstructionsDaniel Günther, Ágnes Kiss, Thomas Schneider 0003. 443-470 [doi]
- Efficient Scalable Constant-Round MPC via Garbled CircuitsAner Ben-Efraim, Yehuda Lindell, Eran Omri. 471-498 [doi]
- Overlaying Conditional Circuit Clauses for Secure ComputationW. Sean Kennedy, Vladimir Kolesnikov, Gordon T. Wilfong. 499-528 [doi]
- JIMU: Faster LEGO-Based Secure Computation Using Additive Homomorphic HashesRuiyu Zhu, Yan Huang. 529-572 [doi]
- Analyzing Multi-key Security DegradationAtul Luykx, Bart Mennink, Kenneth G. Paterson. 575-605 [doi]
- Full-State Keyed Duplex with Built-In Multi-user SupportJoan Daemen, Bart Mennink, Gilles Van Assche. 606-637 [doi]
- Improved Security for OCB3Ritam Bhaumik, Mridul Nandi. 638-666 [doi]
- The Iterated Random Function ProblemRitam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi. 667-697 [doi]