Abstract is missing.
- Amortized Bootstrapping Revisited: Simpler, Asymptotically-Faster, ImplementedAntonio Guimarães, Hilder V. L. Pereira, Barry Van Leeuwen. 3-35 [doi]
- Rotation Key Reduction for Client-Server Systems of Deep Neural Network on Fully Homomorphic EncryptionJoon-Woo Lee, Eunsang Lee, Young-Sik Kim, Jong-Seon No. 36-68 [doi]
- Homomorphic Polynomial Evaluation Using Galois Structure and Applications to BFV BootstrappingHiroki Okada 0001, Rachel Player, Simon Pohmann. 69-100 [doi]
- Amortized Functional Bootstrapping in Less than 7 ms, with Õ(1) Polynomial MultiplicationsZeyu Liu, Yunhao Wang. 101-132 [doi]
- Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic ConstructionsYi Wang 0055, Rongmao Chen, Xinyi Huang 0001, Moti Yung. 135-167 [doi]
- Efficient Secure Storage with Version Control and Key RotationLong Chen 0018, Hui Guo, Ya-nan Li, Qiang Tang 0005. 168-198 [doi]
- Fine-Grained Proxy Re-encryption: Definitions and Constructions from LWEYunxiao Zhou, Shengli Liu 0001, Shuai Han 0001, Haibin Zhang. 199-231 [doi]
- Injection-Secure Structured and Searchable Symmetric EncryptionGhous Amjad, Seny Kamara, Tarik Moataz. 232-262 [doi]
- Hermes: I/O-Efficient Forward-Secure Searchable Symmetric EncryptionBrice Minaud, Michael Reichle. 263-294 [doi]
- To Attest or Not to Attest, This is the Question - Provable Attestation in FIDO2Nina Bindel, Nicolas Gama, Sandra Guasch, Eyal Ronen. 297-328 [doi]
- The Pre-Shared Key Modes of HPKEJoël Alwen, Jonas Janneck, Eike Kiltz, Benjamin Lipp 0001. 329-360 [doi]
- Unified View for Notions of Bit SecurityShun Watanabe, Kenji Yasunaga. 361-389 [doi]
- The Relationship Between Idealized Models Under Computationally Bounded AdversariesCong Zhang, Mark Zhandry. 390-419 [doi]
- Just How Fair is an Unreactive World?Srinivasan Raghuraman, Yibin Yang. 420-450 [doi]