Abstract is missing.
- A New Isogeny Representation and Applications to CryptographyAntonin Leroux. 3-35 [doi]
- Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROMJulien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel. 36-66 [doi]
- Horizontal Racewalking Using Radical IsogeniesWouter Castryck, Thomas Decru, Marc Houben, Frederik Vercauteren. 67-96 [doi]
- kbfZGuilhem Castagnos, Fabien Laguillaumie, Ida Tucker. 99-129 [doi]
- Large-Precision Homomorphic Sign Evaluation Using FHEW/TFHE BootstrappingZeyu Liu, Daniele Micciancio, Yuriy Polyakov. 130-160 [doi]
- EvalRound Algorithm in CKKS BootstrappingSeonghak Kim, Minji Park, Jaehyung Kim, Taekyung Kim, Chohong Min. 161-187 [doi]
- FINAL: Faster FHE Instantiated with NTRU and LWECharlotte Bonte, Ilia Iliashenko, Jeongeun Park 0001, Hilder V. L. Pereira, Nigel P. Smart. 188-215 [doi]
- Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent SetupNan Wang, Sid Chi-Kin Chau. 219-248 [doi]
- Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARKHelger Lipmaa, Janno Siim, Michal Zajac 0001. 249-278 [doi]
- Improved Straight-Line Extraction in the Random Oracle Model with Applications to Signature AggregationYashvanth Kondi, Abhi Shelat. 279-309 [doi]
- SIDH Proof of KnowledgeLuca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig. 310-339 [doi]
- DAG-Σ: A DAG-Based Sigma Protocol for Relations in CNFGongxian Zeng, Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng 0001. 340-370 [doi]
- Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with RejectionThibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud. 371-402 [doi]
- Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear VerifierSungwook Kim, Hyeonbum Lee, Jae Hong Seo. 403-433 [doi]
- Unconditionally Secure NIZK in the Fine-Grained SettingYuyu Wang 0001, Jiaxin Pan. 437-465 [doi]
- Triply Adaptive UC NIZKRan Canetti, Pratik Sarkar, Xiao Wang. 466-495 [doi]
- Efficient NIZKs from LWE via Polynomial Reconstruction and "MPC in the Head"Riddhi Ghosal, Paul Lou, Amit Sahai. 496-521 [doi]
- Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound SecurityYaobin Shen, Ferdinand Sibleyras. 525-554 [doi]
- Jammin' on the DeckNorica Bacuieti, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer. 555-584 [doi]
- A Modular Approach to the Incompressibility of Block-Cipher-Based AEADsAkinori Hosoyamada, Takanori Isobe 0001, Yosuke Todo, Kan Yasuda. 585-619 [doi]
- Security of Truncated Permutation Without Initial ValueLorenzo Grassi 0001, Bart Mennink. 620-650 [doi]
- Puncturable Key Wrapping and Its ApplicationsMatilda Backendal, Felix Günther 0001, Kenneth G. Paterson. 651-681 [doi]
- Multi-user Security of the Sum of Truncated Random PermutationsWonseok Choi, Hwigyeom Kim, Jooyoung Lee 0001, Yeongmin Lee. 682-710 [doi]