Abstract is missing.
- Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliTakashi Yamakawa, Shota Yamada 0001, Goichiro Hanaoka, Noboru Kunihiro. 3-32 [doi]
- Optimal Security Proofs for Signatures from Identification SchemesEike Kiltz, Daniel Masny, Jiaxin Pan. 33-61 [doi]
- FHE Circuit Privacy Almost for FreeFlorian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee. 62-89 [doi]
- Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN ProblemLéo Perrin, Aleksei Udovenko, Alex Biryukov. 93-122 [doi]
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISChristof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi 0001, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim. 123-153 [doi]
- Automatic Search of Meet-in-the-Middle and Impossible Differential AttacksPatrick Derbez, Pierre-Alain Fouque. 157-184 [doi]
- Memory-Efficient Algorithms for Finding Needles in HaystacksItai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. 185-206 [doi]
- Breaking Symmetric Cryptosystems Using Quantum Period FindingMarc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia. 207-237 [doi]
- Efficiently Computing Data-Independent Memory-Hard FunctionsJoël Alwen, Jeremiah Blocki. 241-271 [doi]
- Towards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsStefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, François-Xavier Standaert. 272-301 [doi]
- ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection AttacksTobias Schneider, Amir Moradi 0001, Tim Güneysu. 302-332 [doi]
- Network-Hiding Communication and Applications to Multi-party ProtocolsMartin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas. 335-365 [doi]
- Network Oblivious TransferRanjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon. 366-396 [doi]
- On the Power of Secure Two-Party ComputationCarmit Hazay, Muthuramakrishnan Venkitasubramaniam. 397-429 [doi]
- Secure Protocol TransformationsYuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu. 430-458 [doi]
- On the Communication Required for Unconditionally Secure MultiplicationIvan Damgård, Jesper Buus Nielsen, Antigoni Polychroniadou, Michael Raskin. 459-488 [doi]
- Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness EncryptionPrabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev. 491-520 [doi]
- Obfuscation CombinersMarc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Shulman. 521-550 [doi]
- On Statistically Secure Obfuscation with Approximate CorrectnessZvika Brakerski, Christina Brzuska, Nils Fleischhacker. 551-578 [doi]
- Revisiting the Cryptographic Hardness of Finding a Nash EquilibriumSanjam Garg, Omkant Pandey, Akshayaram Srinivasan. 579-604 [doi]
- Cryptanalysis of GGH15 Multilinear MapsJean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi. 607-628 [doi]
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13Eric Miles, Amit Sahai, Mark Zhandry. 629-658 [doi]
- Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWENavid Alamati, Chris Peikert. 659-680 [doi]
- Circular Security Separations for Arbitrary Length Cycles from LWEVenkata Koppula, Brent Waters. 681-700 [doi]