Abstract is missing.
- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized StorageMatteo Campanelli, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo. 3-35 [doi]
- Non-committing Encryption with Constant Ciphertext Expansion from Standard AssumptionsYusuke Yoshida, Fuyuki Kitagawa, Keita Xagawa, Keisuke Tanaka. 36-65 [doi]
- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard AssumptionsSam Kim, David J. Wu. 66-97 [doi]
- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key EncryptionRongmao Chen, Xinyi Huang, Moti Yung. 98-128 [doi]
- Unbounded HIBE with Tight SecurityRoman Langrehr, Jiaxin Pan. 129-159 [doi]
- Multi-client Oblivious RAM with Poly-logarithmic CommunicationSherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta. 160-190 [doi]
- Privacy-Preserving Pattern Matching on Encrypted DataAnis Bkakria, Nora Cuppens, Frédéric Cuppens. 191-220 [doi]
- Efficient Homomorphic Comparison Methods with Optimal ComplexityJung Hee Cheon, Dongwoo Kim 0003, Duhyeong Kim. 221-256 [doi]
- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting RingsMuhammed F. Esgin, Ngoc Khanh Nguyen 0001, Gregor Seiler. 259-288 [doi]
- Towards Classical Hardness of Module-LWE: The Linear Rank CaseKatharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen. 289-317 [doi]
- Lattice-Based E-Cash, RevisitedAmit Deo, Benoît Libert, Khoa Nguyen, Olivier Sanders. 318-348 [doi]
- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal LatticesOlivier Bernard 0002, Adeline Roux-Langlois. 349-380 [doi]
- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic IntegersDaniele Micciancio, Jessica Sorrell. 381-407 [doi]
- Cryptographic Group Actions and ApplicationsNavid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis. 411-439 [doi]
- B-SIDH: Supersingular Isogeny Diffie-Hellman Using Twisted TorsionCraig Costello. 440-463 [doi]
- Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and LatticesWard Beullens, Shuichi Katsumata, Federico Pintore. 464-492 [doi]
- Radical IsogeniesWouter Castryck, Thomas Decru, Frederik Vercauteren. 493-519 [doi]
- Oblivious Pseudorandom Functions from IsogeniesDan Boneh, Dmitry Kogan, Katharine Woo. 520-550 [doi]
- SiGamal: A Supersingular Isogeny-Based PKE and Its Application to a PRFTomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi. 551-580 [doi]
- Estimating Quantum Speedups for Lattice SievesMartin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck. 583-613 [doi]
- A Combinatorial Approach to Quantum Random FunctionsNico Döttling, Giulio Malavolta, Sihang Pu. 614-632 [doi]
- Improved Classical and Quantum Algorithms for Subset-SumXavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen. 633-666 [doi]
- Security Limitations of Classical-Client Delegated Quantum ComputingChristian Badertscher, Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Dominik Leichtle, Atul Mantri, Petros Wallden. 667-696 [doi]
- Quantum Circuit Implementations of AES with Fewer QubitsJian Zou, Zihao Wei, Siwei Sun, Ximeng Liu, Wenling Wu. 697-726 [doi]
- Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access MemoriesXiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu. 727-757 [doi]
- Fuzzy Asymmetric Password-Authenticated Key ExchangeAndreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi 0002. 761-784 [doi]
- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight SecurityXiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng 0001. 785-814 [doi]