Abstract is missing.
- Forward Security Under Leakage Resilience, RevisitedSuvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan. 3-27 [doi]
- Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWEYoshinori Aono, Junji Shikata. 28-50 [doi]
- Traceable Policy-Based Signatures with DelegationIsmail Afia, Riham AlTawy. 51-72 [doi]
- How to Enumerate LWE Keys as Narrow as in Kyber/DilithiumTimo Glaser, Alexander May 0001. 75-100 [doi]
- Towards Minimizing Non-linearity in Type-II Generalized Feistel NetworksYuqing Zhao, Chun Guo 0002, Weijia Wang 0003. 101-125 [doi]
- Hardness of Learning AES with Gradient-Based MethodsKanat Alimanov, Zhenisbek Assylbekov. 126-133 [doi]
- Privacy-Preserving Digital Vaccine PassportThai Duong, Jiahui Gao, Duong Hieu Phan, Ni Trieu. 137-161 [doi]
- Exploiting Android BrowserAnimesh Kar, Natalia Stakhanova. 162-185 [doi]
- Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent BannersTorsha Mazumdar, Daniel Timko, Muhammad Lutfor Rahman. 186-207 [doi]
- Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-input and ProtocolsTakuto Yoshida, Kodai Tanaka, Keisuke Nakabayashi, Eikoh Chida, Takaaki Mizuki. 211-231 [doi]
- Free-XOR in Card-Based Garbled CircuitsYoshifumi Manabe, Kazumasa Shinagawa. 232-248 [doi]
- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and SignalJohn Preuß Mattsson. 251-267 [doi]
- Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented PrimitivesEmanuele Bellini 0002, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti. 268-292 [doi]
- Key Filtering in Cube Attacks from the Implementation AspectHao Fan, Yonglin Hao, Qingju Wang 0001, Xinxin Gong, Lin Jiao. 293-317 [doi]
- New Techniques for Modeling SBoxes: An MILP ApproachDebranjan Pal, Vishal Pankaj Chandratreya, Dipanwita Roy Chowdhury. 318-340 [doi]
- LucidiTEE: Scalable Policy-Based Multiparty Computation with FairnessSivanarayana Gaddam, Ranjit Kumaresan, Srinivasan Raghuraman, Rohit Sinha 0001. 343-367 [doi]
- Improving Privacy of Anonymous Proof-of-Stake ProtocolsShichen Wu, Zhiying Song, Puwen Wei, Peng Tang, Quan Yuan. 368-391 [doi]
- Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public KeysSurbhi Shaw, Ratna Dutta. 392-413 [doi]
- CTA: Confidential Transactions Protocol with State AccumulatorShumin Si, Puwen Wei, Xiuhan Lin, Li Liu. 414-439 [doi]
- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-Sized SetsSaikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu 0003. 443-467 [doi]
- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret SharingSabyasachi Dutta, Shaoquan Jiang, Reihaneh Safavi-Naini. 468-493 [doi]
- Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding PropertiesHideaki Miyaji, Atsuko Miyaji. 497-515 [doi]
- A Practical Forward-Secure DualRingNan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen. 516-537 [doi]
- Dually Computable Cryptographic Accumulators and Their Application to Attribute Based EncryptionAnaïs Barthoulot, Olivier Blazy, Sébastien Canard. 538-562 [doi]
- A Minor Note on Obtaining Simpler iO Constructions via Depleted ObfuscatorsRazvan Rosie. 563-587 [doi]