Abstract is missing.
- +Andreas Hülsing, Mikhail A. Kudinov. 3-33 [doi]
- On Rejection Sampling in Lyubashevsky's Signature SchemeJulien Devevey, Omar Fawzi, Alain Passelègue, Damien Stehlé. 34-64 [doi]
- Hawk: Module LIP Makes Lattice Signatures Fast, Compact and SimpleLéo Ducas, Eamonn W. Postlethwaite, Ludo N. Pulles, Wessel P. J. van Woerden. 65-94 [doi]
- BLOOM: Bimodal Lattice One-out-of-Many Proofs and ApplicationsVadim Lyubashevsky, Ngoc Khanh Nguyen 0001. 95-125 [doi]
- GUC-Secure Commitments via Random Oracles: New Impossibility and FeasibilityZhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren 0001. 129-158 [doi]
- Additive-Homomorphic Functional Commitments and Applications to Homomorphic SignaturesDario Catalano, Dario Fiore 0001, Ida Tucker. 159-188 [doi]
- Linear-Map Vector Commitments and Their Practical ApplicationsMatteo Campanelli, Anca Nitulescu, Carla Ràfols, Alexandros Zacharakis, Arantxa Zapico. 189-219 [doi]
- PointProofs, RevisitedBenoît Libert, Alain Passelègue, Mahshid Riahinia. 220-246 [doi]
- Universal Ring Signatures in the Standard ModelPedro Branco 0005, Nico Döttling, Stella Wohnig. 249-278 [doi]
- The Abe-Okamoto Partially Blind Signature Scheme RevisitedJulia Kastner, Julian Loss, Jiayu Xu. 279-309 [doi]
- An Analysis of the Algebraic Group ModelCong Zhang, Hong-Sheng Zhou, Jonathan Katz. 310-322 [doi]
- Instantiability of Classical Random-Oracle-Model Encryption TransformsAlice Murphy, Adam O'Neill, Mohammad-Zaheri. 323-352 [doi]
- Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain ModelDaniel Apon, Chloé Cachet, Benjamin Fuller 0001, Peter Hall, Feng-Hao Liu. 353-383 [doi]
- Continuously Non-malleable Codes Against Bounded-Depth TamperingGianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi 0001. 384-413 [doi]
- Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto TransformKathrin Hövelmanns, Andreas Hülsing, Christian Majenz. 414-443 [doi]
- Optimising Linear Key Recovery Attacks with Affine Walsh Transform PruningAntonio Flórez-Gutiérrez. 447-476 [doi]
- Statistical Decoding 2.0: Reducing Decoding to LPNKevin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich. 477-507 [doi]
- A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent BlindingYuanyuan Zhou 0006, Joop van de Pol, Yu Yu 0001, François-Xavier Standaert. 508-536 [doi]
- Stretching Cube Attacks: Improved Methods to Recover Massive SuperpoliesJiahui He, Kai Hu 0001, Bart Preneel, Meiqin Wang. 537-566 [doi]
- Functional Encryption with Secure Key LeasingFuyuki Kitagawa, Ryo Nishimaki. 569-598 [doi]
- Classically Verifiable NIZK for QMA with PreprocessingTomoyuki Morimae, Takashi Yamakawa. 599-627 [doi]
- General Properties of Quantum Bit Commitments (Extended Abstract)Jun Yan. 628-657 [doi]