Abstract is missing.
- Cross-Domain Attribute-Based Access Control EncryptionMahdi Sedaghat, Bart Preneel. 3-23 [doi]
- Grain-128AEADv2: Strengthening the Initialization Against Key ReconstructionMartin Hell, Thomas Johansson 0001, Alexander Maximov, Willi Meier, Hirotaka Yoshida. 24-41 [doi]
- Partition Oracles from Weak Key ForgeriesMarcel Armour, Carlos Cid. 42-62 [doi]
- Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional EncryptionAlberto Ibarrondo, Hervé Chabanne, Melek Önen. 63-71 [doi]
- The Matrix Reloaded: Multiplication Strategies in FrodoKEMJoppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider 0002, Christine van Vredendaal. 72-91 [doi]
- BlindOR: an Efficient Lattice-Based Blind Signature Scheme from OR-ProofsNabil Alkeilani Alkadri, Patrick Harasser, Christian Janson. 95-115 [doi]
- Efficient Threshold-Optimal ECDSAMichaella Pettit. 116-135 [doi]
- MT: A Revocable Group Merkle Multi-tree Signature SchemeMahmoud Yehia, Riham AlTawy, T. Aaron Gulliver. 136-157 [doi]
- Issuer-Hiding Attribute-Based CredentialsJan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin. 158-178 [doi]
- Report and Trace Ring SignaturesAshley Fraser, Elizabeth A. Quaglia. 179-199 [doi]
- Selectively Linkable Group Signatures - Stronger Security and Preserved VerifiabilityAshley Fraser, Lydia Garms, Anja Lehmann. 200-221 [doi]
- FO-like Combiners and Hybrid Post-Quantum CryptographyLoïs Huguenin-Dumittan, Serge Vaudenay. 225-244 [doi]
- Linear-Time Oblivious Permutations for SPDZPeeter Laud. 245-252 [doi]
- On the Higher-Bit Version of Approximate Inhomogeneous Short Integer Solution ProblemAnaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa. 253-272 [doi]
- Practical Continuously Non-malleable Randomness Encoders in the Random Oracle ModelAntonio Faonio. 273-291 [doi]
- Countermeasures Against Backdoor Attacks Towards Malware DetectorsShintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto. 295-314 [doi]
- Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated ServicesJulian Fietkau 0002, David Pascal Runge, Jean-Pierre Seifert. 315-333 [doi]
- Function-Private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point FunctionsNolan Miranda, Foo Yee Yeo, Vipin Singh Sehrawat. 334-354 [doi]
- How Distance-Bounding Can Detect Internet Traffic HijackingGhada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré. 355-371 [doi]
- SoK: Secure Memory AllocationBojan Novkovic, Marin Golub. 372-391 [doi]
- Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial TrainingKento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Nozomu Togawa. 392-411 [doi]
- Towards Quantum Large-Scale Password Guessing on Real-World DistributionsMarkus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May 0001, Lars Schlieper. 412-431 [doi]
- Anonymous Transactions with Revocation and Auditing in Hyperledger FabricDmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann. 435-459 [doi]
- Attestation Waves: Platform Trust via Remote Power AnalysisIgnacio M. Delgado-Lozano, Macarena C. Martínez-Rodríguez, Alexandros Bakas, Billy Bob Brumley, Antonis Michalas. 460-482 [doi]
- How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVotingTamara Finogina, Javier Herranz, Enrique Larraia. 483-491 [doi]
- Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular Zk-SNARKsBehzad Abdolmaleki, Daniel Slamanig. 492-512 [doi]
- THC: Practical and Cost-Effective Verification of Delegated ComputationPablo Rauzy, Ali Nehme. 513-530 [doi]
- Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS ModelKarim Baghery, Mahdi Sedaghat. 531-551 [doi]