Abstract is missing.
- Cryptanalysis of OCB2: Attacks on Authenticity and ConfidentialityAkiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering. 3-31 [doi]
- Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKESamuel Jaques, John M. Schanck. 32-61 [doi]
- Fully Secure Attribute-Based Encryption for t-CNF from LWERotem Tsabary. 62-85 [doi]
- Noninteractive Zero Knowledge for NP from (Plain) Learning with ErrorsChris Peikert, Sina Shiehian. 89-114 [doi]
- Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and ApplicationsMuhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu. 115-146 [doi]
- Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and ApplicationsRupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte. 147-175 [doi]
- Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge ProofsJonathan Bootle, Vadim Lyubashevsky, Gregor Seiler. 176-202 [doi]
- Seedless Fruit Is the Sweetest: Random Number Generation, RevisitedSandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro. 205-234 [doi]
- Nonces Are Noticed: AEAD RevisitedMihir Bellare, Ruth Ng, Björn Tackmann. 235-265 [doi]
- How to Build Pseudorandom Functions from Public Random PermutationsYu Long Chen, Eran Lambooij, Bart Mennink. 266-293 [doi]
- New Results on Modular Inversion Hidden Number Problem and Inversive Congruential GeneratorJun Xu, Santanu Sarkar 0001, Lei Hu, Huaxiong Wang, Yanbin Pan. 297-321 [doi]
- On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum AlgorithmLéo Ducas, Maxime Plançon, Benjamin Wesolowski. 322-351 [doi]
- Proofs of Replicated Storage Without Timing AssumptionsIvan Damgård, Chaya Ganesh, Claudio Orlandi. 355-380 [doi]
- Simple Proofs of Space-Time and Rational Proofs of StorageTal Moran, Ilan Orlov. 381-409 [doi]
- Non-malleable Codes for Decision TreesMarshall Ball, Siyao Guo, Daniel Wichs. 413-434 [doi]
- Explicit Rate-1 Non-malleable Codes for Local TamperingDivya Gupta 0001, Hemanta K. Maji, Mingyuan Wang. 435-466 [doi]
- Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-SpaceBinyi Chen, Yilei Chen, Kristina Hostáková, Pratyay Mukherjee. 467-495 [doi]
- Synchronous, with a Chance of Partition ToleranceYue Guo, Rafael Pass, Elaine Shi. 499-529 [doi]
- Subvector Commitments with Application to Succinct ArgumentsRussell W. F. Lai, Giulio Malavolta. 530-560 [doi]
- Batching Techniques for Accumulators with Applications to IOPs and Stateless BlockchainsDan Boneh, Benedikt Bünz, Ben Fisch. 561-586 [doi]
- On the Plausibility of Fully Homomorphic Encryption for RAMsAriel Hamlin, Justin Holmgren, Mor Weiss, Daniel Wichs. 589-619 [doi]
- Homomorphic Time-Lock Puzzles and ApplicationsGiulio Malavolta, Sri Aravinda Krishnan Thyagarajan. 620-649 [doi]
- Symmetric Primitives with Structured SecretsNavid Alamati, Hart Montgomery, Sikhar Patranabis. 650-679 [doi]
- Unifying Leakage Models on a Rényi DayThomas Prest, Dahmun Goudarzi, Ange Martinelli, Alain Passelègue. 683-712 [doi]
- Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security EvaluationsOlivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert. 713-737 [doi]
- Security in the Presence of Key Reuse: Context-Separable Interfaces and Their ApplicationsChristopher Patton, Thomas Shrimpton. 738-768 [doi]