Abstract is missing.
- Secure and Efficient Software Masking on Superscalar Pipelined ProcessorsBarbara Gigerl, Robert Primas, Stefan Mangard. 3-32 [doi]
- Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round 3 KEM CandidatesKeita Xagawa, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma. 33-61 [doi]
- Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template AttacksSayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin. 62-94 [doi]
- Efficient Leakage-Resilient MACs Without Idealized AssumptionsFrancesco Berti, Chun Guo 0002, Thomas Peters, François-Xavier Standaert. 95-123 [doi]
- DEFAULT: Cipher Level Resistance Against Differential Fault AttackAnubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim. 124-156 [doi]
- Dynamic Random Probing Expansion with Quasi Linear Asymptotic ComplexitySonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud. 157-188 [doi]
- Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree PolynomialsReo Eriguchi, Koji Nuida. 191-221 [doi]
- Improved Single-Round Secure Multiplication Using Regenerating CodesMark Abspoel, Ronald Cramer, Daniel Escudero 0001, Ivan Damgård, Chaoping Xing. 222-244 [doi]
- Garbling, Stacked and Staggered - Faster k-out-of-n Garbled Function EvaluationDavid Heath, Vladimir Kolesnikov, Stanislav Peceny. 245-274 [doi]
- Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party ComputationYu Long Chen, Stefano Tessaro. 275-304 [doi]
- Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDHNavid Alamati, Hart Montgomery, Sikhar Patranabis, Pratik Sarkar. 305-334 [doi]
- Reverse Firewalls for Adaptively Secure MPC Without SetupSuvradip Chakraborty, Chaya Ganesh, Mahak Pancholi, Pratik Sarkar. 335-364 [doi]
- On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order GroupsAron van Baarsen, Marc Stevens 0001. 367-397 [doi]
- Astrolabous: A Universally Composable Time-Lock Encryption SchemeMyrto Arapinis, Nikolaos Lamprou, Thomas Zacharias 0001. 398-426 [doi]
- Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBEYi Wang 0055, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung. 427-455 [doi]
- Simulation-Based Bi-Selective Opening Security for Public Key EncryptionJunzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng 0001. 456-482 [doi]
- Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting: Impossibility Result and Optimal TightnessShuai Han 0001, Shengli Liu, Dawu Gu. 483-513 [doi]
- Hierarchical Integrated Signature and Encryption - (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds)Yu Chen 0003, Qiang Tang, Yuyu Wang 0001. 514-543 [doi]
- Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network ConditionsErica Blum, Jonathan Katz, Julian Loss. 547-572 [doi]
- Onion Routing with RepliesChristiane Kuhn, Dennis Hofheinz, Andy Rupp, Thorsten Strufe. 573-604 [doi]
- Private Join and Compute from PIR with DefaultTancrède Lepoint, Sarvar Patel, Mariana Raykova 0001, Karn Seth, Ni Trieu. 605-634 [doi]
- Generalized Channels from Limited Blockchain Scripts and Adaptor SignaturesLukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi 0002. 635-664 [doi]
- ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger PrivacyWasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch 0001, Jörn Müller-Quade, Thorsten Strufe. 665-695 [doi]
- Cryptographic Analysis of the Bluetooth Secure Connection Protocol SuiteMarc Fischlin, Olga Sanina. 696-725 [doi]