Abstract is missing.
- NTRU Fatigue: How Stretched is Overstretched?Léo Ducas, Wessel P. J. van Woerden. 3-32 [doi]
- Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSQian Guo 0001, Thomas Johansson 0001. 33-62 [doi]
- Lattice Sieving via Quantum Random WalksAndré Chailloux, Johanna Loyer. 63-91 [doi]
- A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMsYue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding. 92-121 [doi]
- Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionKelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart. 125-155 [doi]
- Lattice-Based Group Encryption with Full Dynamicity and Message Filtering PolicyJing Pan, Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo. 156-186 [doi]
- A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOVHiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi. 187-217 [doi]
- Shorter Lattice-Based Group Signatures via "Almost Free" Encryption and Other OptimizationsVadim Lyubashevsky, Ngoc Khanh Nguyen 0001, Maxime Plançon, Gregor Seiler. 218-248 [doi]
- Séta: Supersingular Encryption from Torsion AttacksLuca De Feo, Cyprien Delpech de Saint Guilhem, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Christophe Petit, Javier Silva 0001, Benjamin Wesolowski. 249-278 [doi]
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDHTako Boris Fouotsa, Christophe Petit. 279-307 [doi]
- Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsRishab Goyal, Jiahui Liu, Brent Waters. 311-341 [doi]
- Public Key Encryption with Flexible Pattern MatchingElie Bouscatié, Guilhem Castagnos, Olivier Sanders. 342-370 [doi]
- Bounded Collusion ABE for TMs from IBERishab Goyal, Ridwan Syed, Brent Waters. 371-402 [doi]
- Digital Signatures with Memory-Tight Security in the Multi-challenge SettingDenis Diemert, Kai Gellert, Tibor Jager, Lin Lyu 0001. 403-433 [doi]
- (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-LinPratish Datta, Tapas Pal. 434-467 [doi]
- Boosting the Security of Blind Signature SchemesJonathan Katz, Julian Loss, Michael Rosenberg. 468-492 [doi]
- n) Authenticated Shares ZK ORAMDavid Heath, Vladimir Kolesnikov. 495-525 [doi]
- Compressed $\varSigma $-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold SignaturesThomas Attema, Ronald Cramer, Matthieu Rambaud. 526-556 [doi]
- Promise $\varSigma $-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class GroupsYi Deng 0002, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie. 557-586 [doi]
- The One-More Discrete Logarithm Assumption in the Generic Group ModelBalthazar Bauer, Georg Fuchsbauer, Antoine Plouviez. 587-617 [doi]
- Verifiably-Extractable OWFs and Their Applications to Subversion Zero-KnowledgePrastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac 0001, Arne Tobias Ødegaard. 618-649 [doi]
- Chain Reductions for Multi-signatures and the HBMS SchemeMihir Bellare, Wei Dai. 650-678 [doi]
- Symmetric Key Exchange with Full Forward Security and Robust SynchronizationColin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord. 681-710 [doi]
- Security Analysis of CPaceMichel Abdalla, Björn Haase, Julia Hesse. 711-741 [doi]
- Modular Design of Role-Symmetric Authenticated Key Exchange ProtocolsYuting Xiao, Rui Zhang 0002, Hui Ma 0002. 742-772 [doi]