Abstract is missing.
- Sharing Transformation and Dishonest Majority MPC with Packed Secret SharingVipul Goyal, Antigoni Polychroniadou, Yifan Song. 3-32 [doi]
- Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority - (Extended Abstract)Benny Applebaum, Eliran Kachlon, Arpita Patra. 33-56 [doi]
- Authenticated Garbling from Simple CorrelationsSamuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky. 57-87 [doi]
- Dynamic Local Searchable Symmetric EncryptionBrice Minaud, Michael Reichle. 91-120 [doi]
- Programmable Distributed Point FunctionsElette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov. 121-151 [doi]
- Snapshot-Oblivious RAMs: Sub-logarithmic Efficiency for Short TranscriptsYang Du, Daniel Genkin, Paul Grubbs. 152-181 [doi]
- Tight Preimage Resistance of the Sponge ConstructionCharlotte Lefevre, Bart Mennink. 185-204 [doi]
- Block-Cipher-Based Tree HashingAldo Gunsing. 205-233 [doi]
- Provably Secure Reflection CiphersTim Beyne, Yu Long Chen. 234-263 [doi]
- Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient ChannelsJean Paul Degabriele, Vukasin Karadzic. 264-295 [doi]
- Orion: Zero Knowledge Proof with Linear Prover TimeTiancheng Xie, Yupeng Zhang 0001, Dawn Song. 299-328 [doi]
- Moz$\mathbb {Z}_{2^k}$arella: Efficient Vector-OLE and Zero-Knowledge Proofs over $\mathbb {Z}_{2^k}$Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Peter Scholl. 329-358 [doi]
- Nova: Recursive Zero-Knowledge Arguments from Folding SchemesAbhiram Kothapalli, Srinath Setty, Ioanna Tzialla. 359-388 [doi]
- A New Approach to Efficient Non-Malleable Zero-KnowledgeAllen Kim, Xiao Liang, Omkant Pandey. 389-418 [doi]
- An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active SecurityDamiano Abram, Ivan Damgård, Claudio Orlandi, Peter Scholl. 421-452 [doi]
- Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their ApplicationsBenny Applebaum, Yuval Ishai, Or Karni, Arpita Patra. 453-482 [doi]
- Tight Bounds on the Randomness Complexity of Secure Multiparty ComputationVipul Goyal, Yuval Ishai, Yifan Song. 483-513 [doi]
- Better than Advertised Security for Non-interactive Threshold SignaturesMihir Bellare, Elizabeth C. Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, Chenzhi Zhu. 517-550 [doi]
- Threshold Signatures with Private AccountabilityDan Boneh, Chelsea Komlo. 551-581 [doi]