Abstract is missing.
- The Communication Complexity of Threshold Private Set IntersectionSatrajit Ghosh, Mark Simkin. 3-29 [doi]
- Adaptively Secure MPC with Sublinear Communication ComplexityRan Cohen, Abhi Shelat, Daniel Wichs. 30-60 [doi]
- Communication Lower Bounds for Statistically Secure MPC, With or Without PreprocessingIvan Damgård, Kasper Green Larsen, Jesper Buus Nielsen. 61-84 [doi]
- Communication-Efficient Unconditional MPC with Guaranteed Output DeliveryVipul Goyal, Yanyi Liu, Yifan Song. 85-114 [doi]
- Efficient Collision Attack Frameworks for RIPEMD-160Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao. 117-149 [doi]
- Improving Attacks on Round-Reduced Speck32/64 Using Deep LearningAron Gohr. 150-179 [doi]
- Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUSDanping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu. 180-209 [doi]
- Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR ProblemGaëtan Leurent, Ferdinand Sibleyras. 210-235 [doi]
- How to Record Quantum Queries, and Applications to Quantum IndifferentiabilityMark Zhandry. 239-268 [doi]
- Quantum Security Proofs Using Semi-classical OraclesAndris Ambainis, Mike Hamburg, Dominique Unruh. 269-295 [doi]
- Quantum Indistinguishability of Random SpongesJan Czajkowski, Andreas Hülsing, Christian Schaffner. 296-325 [doi]
- Revisiting Post-quantum Fiat-ShamirQipeng Liu, Mark Zhandry. 326-355 [doi]
- Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle ModelJelle Don, Serge Fehr, Christian Majenz, Christian Schaffner. 356-383 [doi]
- Unconditionally Secure Computation Against Low-Complexity LeakageAndrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan. 387-416 [doi]
- Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof SystemShuai Han, Shengli Liu, Lin Lyu, Dawu Gu. 417-447 [doi]
- Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved RateAntonio Faonio, Daniele Venturi 0001. 448-479 [doi]
- Leakage Resilient Secret Sharing and ApplicationsAkshayaram Srinivasan, Prashant Nalini Vasudevan. 480-509 [doi]
- Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access StructuresDivesh Aggarwal, Ivan Damgård, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto, João Ribeiro, Mark Simkin. 510-539 [doi]
- Memory-Hard Functions from Cryptographic PrimitivesBinyi Chen, Stefano Tessaro. 543-572 [doi]
- Data-Independent Memory Hard Functions: New Attacks and Stronger ConstructionsJeremiah Blocki, Benjamin Harsha, Siteng Kang, Seunghoon Lee, Lu Xing, Samson Zhou. 573-607 [doi]
- Simultaneous Amplification: The Case of Non-interactive Zero-KnowledgeVipul Goyal, Aayush Jain, Amit Sahai. 608-637 [doi]
- The Privacy Blanket of the Shuffle ModelBorja Balle, James Bell, Adrià Gascón, Kobbi Nissim. 638-667 [doi]
- Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate EncryptionVenkata Koppula, Brent Waters. 671-700 [doi]
- Match Me if You Can: Matchmaking Encryption and Its ApplicationsGiuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi 0001. 701-731 [doi]
- ABE for DFA from k-LinJunqing Gong, Brent Waters, Hoeteck Wee. 732-764 [doi]
- Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWEShweta Agrawal, Monosij Maitra, Shota Yamada 0001. 765-797 [doi]
- The Distinction Between Fixed and Random Generators in Group-Based AssumptionsJames Bartusek, Fermi Ma, Mark Zhandry. 801-830 [doi]
- Unifying Computational Entropies via Kullback-Leibler DivergenceRohit Agrawal 0002, Yi-Hsiu Chen, Thibaut Horel, Salil P. Vadhan. 831-858 [doi]