Abstract is missing.
- Collision Resistant Hashing from Sub-exponential Learning Parity with NoiseYu Yu 0001, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li. 3-24 [doi]
- New Code-Based Privacy-Preserving Cryptographic ConstructionsKhoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng. 25-55 [doi]
- An LLL Algorithm for Module LatticesChangmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet. 59-90 [doi]
- Order-LWE and the Hardness of Ring-LWE with Entropic SecretsMadalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma. 91-120 [doi]
- On the Non-existence of Short Vectors in Random Module LatticesNgoc Khanh Nguyen 0001. 121-150 [doi]
- Forkcipher: A New Primitive for Authenticated Encryption of Very Short MessagesElena Andreeva 0001, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy 0005, Damian Vizár. 153-182 [doi]
- Anonymous AEJohn Chan, Phillip Rogaway. 183-208 [doi]
- Sponges Resist Leakage: The Case of Authenticated EncryptionJean Paul Degabriele, Christian Janson, Patrick Struck. 209-240 [doi]
- Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based CryptographyMichael Naehrig, Joost Renes. 243-272 [doi]
- Optimized Method for Computing Odd-Degree Isogenies on Edwards CurvesSuhri Kim, Kisoon Yoon, Young-Ho Park 0001, Seokhie Hong. 273-292 [doi]
- Hard Isogeny Problems over RSA Moduli and Groups with Infeasible InversionSalim Ali Altug, Yilei Chen. 293-322 [doi]
- On Kilian's Randomization of Multilinear Map EncodingsJean-Sébastien Coron, Hilder V. L. Pereira. 325-355 [doi]
- Cryptanalysis of CLT13 Multilinear Maps with Independent SlotsJean-Sébastien Coron, Luca Notarnicola. 356-385 [doi]
- Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear MapsMichel Abdalla, Fabrice Benhamouda, Alain Passelègue. 386-412 [doi]
- Numerical Method for Comparison on Homomorphically Encrypted NumbersJung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun-Hee Lee, Keewoo Lee. 415-445 [doi]
- Multi-Key Homomorphic Encryption from TFHEHao Chen 0030, Ilaria Chillotti, Yongsoo Song. 446-472 [doi]
- Homomorphic Encryption for Finite AutomataNicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio. 473-502 [doi]
- Efficient Explicit Constructions of Multipartite Secret Sharing SchemesQi Chen, Chunming Tang, Zhiqiang Lin. 505-536 [doi]
- Perfectly Secure Oblivious RAM with Sublinear Bandwidth OverheadMichael A. Raskin, Mark Simkin 0001. 537-563 [doi]
- How to Correct Errors in Multi-server PIRKaoru Kurosawa. 564-574 [doi]
- UC-Secure Multiparty Computation from One-Way Functions Using Stateless TokensSaikrishna Badrinarayanan, Abhishek Jain 0002, Rafail Ostrovsky, Ivan Visconti. 577-605 [doi]
- Efficient UC Commitment Extension with Homomorphism for Free (and Applications)Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli. 606-635 [doi]
- Scalable Private Set Union from Symmetric-Key TechniquesVladimir Kolesnikov, Mike Rosulek, Ni Trieu, Xiao Wang 0012. 636-666 [doi]