Abstract is missing.
- Which E-Voting Problems Do We Need to Solve?Vanessa Teague. 3-7 [doi]
- On the Possibility of Basing Cryptography on EXP≠ BPPYanyi Liu, Rafael Pass. 11-40 [doi]
- Linear Cryptanalysis of FF3-1 and FEATim Beyne. 41-69 [doi]
- Efficient Key Recovery for All HFE Signature VariantsChengdong Tao, Albrecht Petzoldt, Jintai Ding. 70-93 [doi]
- Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled CircuitsMike Rosulek, Lawrence Roy. 94-124 [doi]
- Threshold Schnorr with Stateless Deterministic Signing from Standard AssumptionsFrançois Garillot, Yashvanth Kondi, Payman Mohassel, Valeria Nikolaenko. 127-156 [doi]
- Two-Round Trip Schnorr Multi-signatures via Delinearized WitnessesHandan Kilinç Alper, Jeffrey Burdges 0001. 157-188 [doi]
- MuSig2: Simple Two-Round Schnorr Multi-signaturesJonas Nick, Tim Ruffing, Yannick Seurin. 189-221 [doi]
- Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for ${\varSigma }$-ProtocolsLior Rotem, Gil Segev 0001. 222-250 [doi]
- DualRing: Generic Construction of Ring Signatures with Efficient InstantiationsTsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding. 251-281 [doi]
- Compact Ring Signatures from Learning with ErrorsRohit Chatterjee, Sanjam Garg, Mohammad Hajiabadi, Dakshita Khurana, Xiao Liang, Giulio Malavolta, Omkant Pandey, Sina Shiehian. 282-312 [doi]
- A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant RoundsNai-Hui Chia, Kai-Min Chung, Takashi Yamakawa. 315-345 [doi]
- On the Concurrent Composition of Quantum Zero-KnowledgePrabhanjan Ananth, Kai-Min Chung, Rolando L. La Placa. 346-374 [doi]
- Multi-theorem Designated-Verifier NIZK for QMAOmri Shmueli. 375-405 [doi]
- On the Round Complexity of Secure Quantum ComputationJames Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma. 406-435 [doi]
- Round Efficient Secure Multiparty Quantum Computation with Identifiable AbortBar Alon, Hao Chung, Kai-Min Chung, Mi-Ying Huang, Yi Lee, Yu-Ching Shen. 436-466 [doi]
- One-Way Functions Imply Secure Computation in a Quantum WorldJames Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma. 467-496 [doi]
- Impossibility of Quantum Virtual Black-Box Obfuscation of Classical CircuitsGorjan Alagic, Zvika Brakerski, Yfke Dulek, Christian Schaffner. 497-525 [doi]
- New Approaches for Quantum Copy-ProtectionScott Aaronson, Jiahui Liu, Qipeng Liu, Mark Zhandry, Ruizhe Zhang 0001. 526-555 [doi]
- Hidden Cosets and Applications to Unclonable CryptographyAndrea Coladangelo, Jiahui Liu, Qipeng Liu, Mark Zhandry. 556-584 [doi]
- On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle ModelAkinori Hosoyamada, Tetsu Iwata. 585-615 [doi]
- Quantum Collision Attacks on Reduced SHA-256 and SHA-512Akinori Hosoyamada, Yu Sasaki. 616-646 [doi]
- Halo Infinite: Proof-Carrying Data from Additive Polynomial CommitmentsDan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon. 649-680 [doi]
- Proof-Carrying Data Without Succinct ArgumentsBenedikt Bünz, Alessandro Chiesa, William Lin, Pratyush Mishra, Nicholas Spooner. 681-710 [doi]
- Subquadratic SNARGs in the Random Oracle ModelAlessandro Chiesa, Eylon Yogev. 711-741 [doi]
- Sumcheck Arguments and Their ApplicationsJonathan Bootle, Alessandro Chiesa, Katerina Sotiraki. 742-773 [doi]
- An Algebraic Framework for Universal and Updatable SNARKsCarla Ràfols, Arantxa Zapico. 774-804 [doi]