Abstract is missing.
- The One-Wayness of Jacobi SignaturesHenry Corrigan-Gibbs, David J. Wu 0001. 3-13 [doi]
- Generic and Algebraic Computation Models: When AGM Proofs Transfer to the GGMJoseph Jaeger, Deep Inder Mohan. 14-45 [doi]
- Limits on the Power of Prime-Order Groups: Separating Q-Type from Static AssumptionsGeorge Lu, Mark Zhandry. 46-74 [doi]
- QFESTA: Efficient Algorithms and Parameters for FESTA Using Quaternion AlgebrasKohei Nakagawa, Hiroshi Onuki. 75-106 [doi]
- Radical $\root N \of {\mathrm {\acute{e}lu}}$ Isogeny FormulaeThomas Decru. 107-128 [doi]
- Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential WorkChris Peikert, Yi Tang. 129-157 [doi]
- Memory-Sample Lower Bounds for LWEMingQi Lu, Junzhao Yang. 158-182 [doi]
- Improved Algorithms for Finding Fixed-Degree Isogenies Between Supersingular Elliptic CurvesBenjamin Bencina, Péter Kutas, Simon-Philipp Merz, Christophe Petit 0001, Miha Stopar, Charlotte Weitkämper. 183-217 [doi]
- Traceable Secret Sharing: Strong Security and Efficient ConstructionsDan Boneh, Aditi Partap, Lior Rotem. 221-256 [doi]
- Towards Breaking the Half-Barrier of Local Leakage-Resilient Shamir's Secret SharingHai H. Nguyen. 257-285 [doi]
- Stochastic Secret Sharing with 1-Bit Shares and Applications to MPCBenny Applebaum, Eliran Kachlon. 286-320 [doi]
- Sometimes You Can't Distribute Random-Oracle-Based ProofsJack Doerner, Yashvanth Kondi, Leah Namisa Rosenbloom. 323-358 [doi]
- Quantum Advantage from One-Way FunctionsTomoyuki Morimae, Takashi Yamakawa. 359-392 [doi]
- On Sequential Functions and Fine-Grained CryptographyJiaxin Guan, Hart Montgomery. 393-428 [doi]
- Collision Resistance from Multi-collision Resistance for All Constant ParametersJan Buzek, Stefano Tessaro. 429-458 [doi]
- Structural Lower Bounds on Black-Box Constructions of Pseudorandom FunctionsAmos Beimel, Tal Malkin, Noam Mazor. 459-488 [doi]