Abstract is missing.
- New Algorithms and Analyses for Sum-Preserving EncryptionSarah Miracle, Scott Yilek. 3-31 [doi]
- Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream CipherOrel Cosseron, Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert. 32-67 [doi]
- Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided ToolPatrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen. 68-88 [doi]
- On Secure Ratcheting with Immediate DecryptionJeroen Pijnenburg, Bertram Poettering. 89-118 [doi]
- Strongly Anonymous Ratcheted Key ExchangeBenjamin Dowling, Eduard Hauck, Doreen Riepel, Paul Rösler. 119-150 [doi]
- Encryption to the Future - A Paradigm for Sending Secret Messages to Future (Anonymous) CommitteesMatteo Campanelli, Bernardo David, Hamidreza Khoshakhlagh, Anders Konring, Jesper Buus Nielsen. 151-180 [doi]
- Authenticated Encryption with Key IdentificationJulia Len, Paul Grubbs, Thomas Ristenpart. 181-209 [doi]
- Privacy-Preserving Authenticated Key Exchange in the Standard ModelYou Lyu, Shengli Liu 0001, Shuai Han 0001, Dawu Gu. 210-240 [doi]
- On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMCJiamin Cui, Kai Hu 0001, Meiqin Wang, Puwen Wei. 241-270 [doi]
- Traceable Receipt-Free EncryptionHenri Devillez, Olivier Pereira, Thomas Peters. 273-303 [doi]
- Efficient Searchable Symmetric Encryption for Join QueriesCharanjit S. Jutla, Sikhar Patranabis. 304-333 [doi]
- Knowledge Encryption and Its Applications to Simulatable Protocols with Low Round-ComplexityYi Deng 0002, Xinxuan Zhang. 334-362 [doi]
- Compact and Tightly Selective-Opening Secure Public-key Encryption SchemesJiaxin Pan, Runzhi Zeng. 363-393 [doi]
- Identity-Based Matchmaking Encryption from Standard AssumptionsJie Chen, Yu Li, Jinming Wen, Jian Weng 0001. 394-422 [doi]
- Anonymous Public Key Encryption Under CorruptionsZhengan Huang, Junzuo Lai, Shuai Han 0001, Lin Lyu 0001, Jian Weng 0001. 423-453 [doi]
- Memory-Tight Multi-challenge Security of Public-Key EncryptionJoseph Jaeger, Akshaya Kumar. 454-484 [doi]
- Short-lived Zero-Knowledge Proofs and SignaturesArasu Arun, Joseph Bonneau, Jeremy Clark. 487-516 [doi]
- Non-interactive Zero-Knowledge Proofs to Multiple VerifiersKang Yang 0002, Xiao Wang 0012. 517-546 [doi]
- Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries with Application to Key TransparencyBrian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou. 547-580 [doi]
- Nostradamus Goes QuantumBarbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert. 583-613 [doi]
- Synthesizing Quantum Circuits of AES with Lower T-depth and Less QubitsZhenyu Huang, Siwei Sun. 614-644 [doi]
- Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3Jian Guo 0001, Guozhen Liu, Ling Song 0001, Yi Tu. 645-674 [doi]
- S-unit Lattices Using Explicit Stickelberger Generators to Solve Approx Ideal-SVPOlivier Bernard 0002, Andrea Lesavourey, Tuong-Huy Nguyen, Adeline Roux-Langlois. 677-708 [doi]
- On Module Unique-SVP and NTRUJoël Felderhoff, Alice Pellet-Mary, Damien Stehlé. 709-740 [doi]
- A Non-heuristic Approach to Time-Space Tradeoffs and Optimizations for BKWHanlin Liu, Yu Yu 0001. 741-770 [doi]
- Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key ExchangeJun Xu 0022, Santanu Sarkar 0001, Huaxiong Wang, Lei Hu. 771-799 [doi]