Abstract is missing.
- Full Quantum Equivalence of Group Action DLog and CDH, and MoreHart Montgomery, Mark Zhandry. 3-32 [doi]
- Cryptographic Primitives with Hinting PropertyNavid Alamati, Sikhar Patranabis. 33-62 [doi]
- SwiftEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves - Faster Indifferentiable Hashing to Elliptic CurvesJorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi. 63-92 [doi]
- Multi-Client Functional Encryption with Fine-Grained Access ControlKy Nguyen, Duong Hieu Phan, David Pointcheval. 95-125 [doi]
- Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDHPratish Datta, Tapas Pal, Katsuyuki Takashima. 126-159 [doi]
- Collusion-Resistant Functional Encryption for RAMsPrabhanjan Ananth, Kai-Min Chung, Xiong Fan, Luowen Qian. 160-194 [doi]
- Witness Encryption and Null-IO from Evasive LWEVinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs. 195-221 [doi]
- Algebraic Meet-in-the-Middle Attack on LowMCFukang Liu, Santanu Sarkar 0001, Gaoli Wang, Willi Meier, Takanori Isobe 0001. 225-255 [doi]
- Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of ForróMurilo Coutinho, Iago Passos, Juan C. Grados Vásquez, Fábio Lúcio Lopes de Mendonça, Rafael Timteo de Sousa, Fábio Borges. 256-286 [doi]
- Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256Lingyue Qin, Xiaoyang Dong, Anyu Wang 0003, Jialiang Hua, Xiaoyun Wang 0001. 287-317 [doi]
- Enhancing Differential-Neural CryptanalysisZhenzhen Bao, Jian Guo 0001, Meicheng Liu, Li Ma, Yi Tu. 318-347 [doi]
- Towards Tight Security Bounds for OMAC, XCBC and TMACSoumya Chattopadhyay, Ashwin Jha, Mridul Nandi. 348-378 [doi]
- A Modular Approach to the Security Analysis of Two-Permutation ConstructionsYu Long Chen. 379-409 [doi]
- Optimizing Rectangle Attacks: A Unified and Generic Framework for Key RecoveryLing Song 0001, Nana Zhang, Qianqian Yang 0003, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng 0001. 410-440 [doi]
- Random Sources in Private ComputationGeoffroy Couteau, Adi Rosén. 443-473 [doi]
- Non-interactive Secure Computation of Inner-Product from LPN and LWEGeoffroy Couteau, Maryam Zarezadeh. 474-503 [doi]
- Efficient Adaptively-Secure Byzantine Agreement for Long MessagesAmey Bhangale, Chen-Da Liu Zhang, Julian Loss, Kartik Nayak. 504-525 [doi]
- Concurrently Composable Non-interactive Secure ComputationAndrew Morgan, Rafael Pass. 526-555 [doi]
- Attaining GOD Beyond Honest Majority with Friends and FoesAditya Hegde 0003, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul. 556-587 [doi]
- Towards Practical Topology-Hiding ComputationShuaishuai Li. 588-617 [doi]
- Key-Schedule Security for the TLS 1.3 StandardChris Brzuska, Antoine Delignat-Lavaud, Christoph Egger 0001, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss. 621-650 [doi]
- YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO ModelIgnacio Cascudo, Bernardo David, Lydia Garms, Anders Konring. 651-680 [doi]
- State Machine Replication Under Changing Network ConditionsAndreea B. Alexandru, Erica Blum, Jonathan Katz, Julian Loss. 681-710 [doi]
- Non-interactive Mimblewimble Transactions, RevisitedGeorg Fuchsbauer, Michele Orrù. 713-744 [doi]
- A Universally Composable Non-interactive Aggregate Cash SystemYanxue Jia, Shifeng Sun 0001, Hong-Sheng Zhou, Dawu Gu. 745-773 [doi]
- Practical Provably Secure Flooding for BlockchainsChen-Da Liu Zhang, Christian Matt 0002, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen. 774-805 [doi]
- SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light ClientsHamza Abusalah, Georg Fuchsbauer, Peter Gazi, Karen Klein. 806-836 [doi]