Abstract is missing.
- On Multiparty Garbling of Arithmetic CircuitsAner Ben-Efraim. 3-33 [doi]
- S -Universal Garbled Circuit (Almost) for FreeVladimir Kolesnikov. 34-58 [doi]
- Secure Computation with Low Communication from Cross-CheckingS. Dov Gordon, Samuel Ranellucci, Xiao Wang 0012. 59-85 [doi]
- Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez. 86-117 [doi]
- Non-interactive Secure Computation from One-Way FunctionsSaikrishna Badrinarayanan, Abhishek Jain 0002, Rafail Ostrovsky, Ivan Visconti. 118-138 [doi]
- Simple and Efficient Two-Server ORAMS. Dov Gordon, Jonathan Katz, Xiao Wang 0012. 141-157 [doi]
- More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server SettingT.-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi. 158-188 [doi]
- A Universally Composable Framework for the Privacy of Email EcosystemsPyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias 0001. 191-221 [doi]
- State Separation for Code-Based Game-Playing ProofsChris Brzuska, Antoine Delignat-Lavaud, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss. 222-249 [doi]
- Security of the Blockchain Against Long Delay AttackPuwen Wei, Quan Yuan, Yuliang Zheng. 250-275 [doi]
- Homomorphic Secret Sharing for Low Degree PolynomialsRussell W. F. Lai, Giulio Malavolta, Dominique Schröder. 279-309 [doi]
- Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder TheoremYu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang. 310-331 [doi]
- Optimal Linear Multiparty Conditional Disclosure of Secrets ProtocolsAmos Beimel, Naty Peter. 332-362 [doi]
- Towards Practical Key Exchange from Ordinary Isogeny GraphsLuca De Feo, Jean Kieffer, Benjamin Smith. 365-394 [doi]
- CSIDH: An Efficient Post-Quantum Commutative Group ActionWouter Castryck, Tanja Lange 0001, Chloe Martindale, Lorenz Panny, Joost Renes. 395-427 [doi]
- Computing Supersingular Isogenies on Kummer SurfacesCraig Costello. 428-456 [doi]
- Robustly Reusable Fuzzy Extractor from Standard AssumptionsYunhua Wen, Shengli Liu. 459-489 [doi]
- Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDHTibor Jager, Rafael Kurek, Jiaxin Pan. 490-518 [doi]
- Simulatable Channels: Extended Security that is Universally Composable and Easier to ProveJean Paul Degabriele, Marc Fischlin. 519-550 [doi]