Abstract is missing.
- Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey)Elaine Shi. 3-17 [doi]
- Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on CodesThomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich. 21-51 [doi]
- Middle-Product Learning with Rounding Problem and Its ApplicationsShi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang. 55-81 [doi]
- A Novel CCA Attack Using Decryption Errors Against LACQian Guo 0001, Thomas Johansson 0001, Jing Yang. 82-111 [doi]
- Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and MorePrabhanjan Ananth, Xiong Fan, Elaine Shi. 112-141 [doi]
- 4-Round Luby-Rackoff Construction is a qPRPAkinori Hosoyamada, Tetsu Iwata. 145-174 [doi]
- Indifferentiability of Truncated Random PermutationsWonseok Choi, ByeongHak Lee, Jooyoung Lee. 175-195 [doi]
- Anomalies and Vector Space Search: Tools for S-Box AnalysisXavier Bonnetain, Léo Perrin, Shizhu Tian. 196-223 [doi]
- CSI-FiSh: Efficient Isogeny Based Signatures Through Class Group ComputationsWard Beullens, Thorsten Kleinjung, Frederik Vercauteren. 227-247 [doi]
- Verifiable Delay Functions from Supersingular Isogenies and PairingsLuca De Feo, Simon Masson, Christophe Petit, Antonio Sanso. 248-277 [doi]
- Strongly Secure Authenticated Key Exchange from Supersingular IsogeniesXiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Song Tian. 278-308 [doi]
- Dual-Mode NIZKs from ObfuscationDennis Hofheinz, Bogdan Ursu. 311-341 [doi]
- Output Compression, MPC, and iO for Turing MachinesSaikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters. 342-370 [doi]
- Collusion Resistant Watermarking Schemes for Cryptographic FunctionalitiesRupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu. 371-398 [doi]
- Valiant's Universal Circuits Revisited: An Overall Improvement and a Lower BoundShuoyao Zhao, Yu Yu 0001, Jiang Zhang, Hanlin Liu. 401-425 [doi]
- The Broadcast Message Complexity of Secure Multiparty ComputationSanjam Garg, Aarushi Goel, Abhishek Jain 0002. 426-455 [doi]
- Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party ComputationArpita Patra, Divya Ravi. 456-487 [doi]
- Card-Based Cryptography Meets Formal VerificationAlexander Koch 0001, Michael Schrempp, Michael Kirsten. 488-517 [doi]
- Quantum Algorithms for the Approximate k-List Problem and Their Application to Lattice SievingElena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik. 521-551 [doi]
- Quantum Attacks Without Superposition Queries: The Offline Simon's AlgorithmXavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher. 552-583 [doi]
- Quantum Random Oracle Model with Auxiliary InputMinki Hhan, Keita Xagawa, Takashi Yamakawa. 584-614 [doi]
- QFactory: Classically-Instructed Remote Secret Qubits PreparationAlexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden. 615-645 [doi]
- Quisquis: A New Design for Anonymous CryptocurrenciesPrastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, Claudio Orlandi. 649-678 [doi]
- Divisible E-Cash from Constrained Pseudo-Random FunctionsFlorian Bourse, David Pointcheval, Olivier Sanders. 679-708 [doi]