Abstract is missing.
- Fast Blind Rotation for Bootstrapping FHEsBinwu Xiang, Jiang Zhang 0001, Yi Deng 0002, Yiran Dai, Dengguo Feng. 3-36 [doi]
- HERMES: Efficient Ring Packing Using MLWE Ciphertexts and Application to TranscipheringYoungjin Bae, Jung Hee Cheon, Jaehyung Kim, Jai Hyun Park, Damien Stehlé. 37-69 [doi]
- Accelerating HE Operations from Key Decomposition TechniqueMiran Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song. 70-92 [doi]
- MacORAMa: Optimal Oblivious RAM with IntegritySurya Mathialagan, Neekon Vafa. 95-127 [doi]
- Tri-State Circuits - A Circuit Model that Captures RAMDavid Heath, Vladimir Kolesnikov, Rafail Ostrovsky. 128-160 [doi]
- Limits of Breach-Resistant and Snapshot-Oblivious RAMsGiuseppe Persiano, Kevin Yeo. 161-196 [doi]
- Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and ApplicationsKevin Yeo. 197-230 [doi]
- The Pseudorandom Oracle Model and Ideal ObfuscationAayush Jain, Huijia Lin, Ji Luo 0002, Daniel Wichs. 233-262 [doi]
- Computational Wiretap Coding from Indistinguishability ObfuscationYuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry. 263-293 [doi]
- On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key ConfirmationKai Gellert, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager. 297-329 [doi]
- Security Analysis of the WhatsApp End-to-End Encrypted Backup ProtocolGareth T. Davies, Sebastian H. Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth, Tibor Jager. 330-361 [doi]
- On Active Attack Detection in Messaging with Immediate DecryptionKhashayar Barooti, Daniel Collins 0001, Simone Colombo 0002, Loïs Huguenin-Dumittan, Serge Vaudenay. 362-395 [doi]
- Fork-Resilient Continuous Group Key AgreementJoël Alwen, Marta Mularczyk, Yiannis Tselekounis. 396-429 [doi]
- Streaming Functional EncryptionJiaxin Guan, Alexis Korb, Amit Sahai. 433-463 [doi]
- Attribute-Based Multi-input FE (and More) for Attribute-Weighted SumsShweta Agrawal, Junichi Tomida, Anshu Yadav. 464-497 [doi]
- How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and MoreCody Freitag, Brent Waters, David J. Wu 0001. 498-531 [doi]
- Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWEShweta Agrawal, Mélissa Rossi, Anshu Yadav, Shota Yamada 0001. 532-564 [doi]
- Correlated Pseudorandomness from the Hardness of Quasi-Abelian DecodingMaxime Bombar, Geoffroy Couteau, Alain Couvreur, Clément Ducros. 567-601 [doi]
- Expand-Convolute Codes for Pseudorandom Correlation Generators from LPNSrinivasan Raghuraman, Peter Rindal, Titouan Tanguy. 602-632 [doi]
- Correlation Intractability and SNARGs from Sub-exponential DDHArka Rai Choudhuri, Sanjam Garg, Abhishek Jain 0002, Zhengzhong Jin, Jiaheng Zhang. 635-668 [doi]
- Algebraic Reductions of KnowledgeAbhiram Kothapalli, Bryan Parno. 669-701 [doi]
- On the Impossibility of Algebraic NIZK in Pairing-Free GroupsEmanuele Giunta. 702-730 [doi]
- A Note on Non-interactive Zero-Knowledge from CDHGeoffroy Couteau, Abhishek Jain 0002, Zhengzhong Jin, Willy Quach. 731-764 [doi]