Abstract is missing.
- Handling Adaptive Compromise for Practical Encryption SchemesJoseph Jaeger, Nirvan Tyagi. 3-32 [doi]
- Overcoming Impossibility Results in Composable Security Using Interval-Wise GuaranteesDaniel Jost 0001, Ueli Maurer. 33-62 [doi]
- Indifferentiability for Public Key CryptosystemsMark Zhandry, Cong Zhang 0001. 63-93 [doi]
- Quantifying the Security Cost of Migrating Protocols to PracticeChristopher Patton, Thomas Shrimpton. 94-124 [doi]
- The Memory-Tightness of Authenticated EncryptionAshrujit Ghoshal, Joseph Jaeger, Stefano Tessaro. 127-156 [doi]
- Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash FunctionsAkshima, David Cash, Andrew Drucker, Hoeteck Wee. 157-186 [doi]
- The Summation-Truncation Hybrid: Reusing Discarded Bits for FreeAldo Gunsing, Bart Mennink. 187-217 [doi]
- Security Analysis of NIST CTR-DRBGViet Tung Hoang, Yaobin Shen. 218-247 [doi]
- Security Analysis and Improvements for the IETF MLS Standard for Group MessagingJoël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis. 248-277 [doi]
- Universally Composable Relaxed Password Authenticated Key ExchangeMichel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu. 278-307 [doi]
- Anonymous Tokens with Private Metadata BitBen Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova 0001. 308-336 [doi]
- Random Probing Security: Verification, Composition, Expansion and New ConstructionsSonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb. 339-368 [doi]
- Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance JungleDavide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert. 369-400 [doi]
- Leakage-Resilient Key Exchange and Two-Seed ExtractorsXin Li, Fermi Ma, Willy Quach, Daniel Wichs. 401-429 [doi]
- Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe ModelSarvar Patel, Giuseppe Persiano, Kevin Yeo. 433-463 [doi]
- Fast and Secure Updatable EncryptionColin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang. 464-493 [doi]
- Incompressible EncodingsTal Moran, Daniel Wichs. 494-523 [doi]
- New Constructions of Hinting PRGs, OWFs with Encryption, and MoreRishab Goyal, Satyanarayana Vusirikala, Brent Waters. 527-558 [doi]
- Adaptively Secure Constrained Pseudorandom Functions in the Standard ModelAlex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa. 559-589 [doi]
- Collusion Resistant Watermarkable PRFs from Standard AssumptionsRupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu. 590-620 [doi]
- Verifiable Registration-Based EncryptionRishab Goyal, Satyanarayana Vusirikala. 621-651 [doi]
- 1/3 and More from PairingsMark Zhandry. 652-682 [doi]
- Functional Encryption for Attribute-Weighted Sums from k-LinMichel Abdalla, Junqing Gong, Hoeteck Wee. 685-716 [doi]
- Amplifying the Security of Functional Encryption, UnconditionallyAayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai. 717-746 [doi]
- Dynamic Decentralized Functional EncryptionJérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval. 747-775 [doi]
- On Succinct Arguments and Witness Encryption from GroupsOhad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu. 776-806 [doi]
- Fully Deniable Interactive EncryptionRan Canetti, Sunoo Park, Oxana Poburinnaya. 807-835 [doi]
- Chosen Ciphertext Security from Injective Trapdoor FunctionsSusan Hohenberger, Venkata Koppula, Brent Waters. 836-866 [doi]