Abstract is missing.
- Zero-Knowledge in EasyCryptDenis Firsov, Dominique Unruh. 1-16 [doi]
- Statement-Oblivious Threshold Witness EncryptionSebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser. 17-32 [doi]
- Preimage Awareness in LinicryptZahra Javar, Bruce M. Kapron. 33-42 [doi]
- Election Verifiability with ProVerifVincent Cheval, Véronique Cortier, Alexandre Debant. 43-58 [doi]
- Election Verifiability in Receipt-Free Voting ProtocolsSevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang 0001. 59-74 [doi]
- Proving Unlinkability Using ProVerif Through Desynchronised Bi-ProcessesDavid Baelde, Alexandre Debant, Stéphanie Delaune. 75-90 [doi]
- Basilic: Resilient-Optimal Consensus Protocols with Benign and Deceitful FaultsAlejandro Ranchal Pedrosa, Vincent Gramoli. 91-106 [doi]
- Towards a Game-Theoretic Security Analysis of Off-Chain ProtocolsSophie Rain, Georgia Avarikioti, Laura Kovács, Matteo Maffei. 107-122 [doi]
- Keep Spending: Beyond Optimal Cyber-Security InvestmentYunxiao Zhang, Pasquale Malacaria. 123-136 [doi]
- A State-Separating Proof for Yao's Garbling SchemeChris Brzuska, Sabine Oechsner. 137-152 [doi]
- On the Incoercibility of Digital SignaturesAshley Fraser, Lydia Garms, Elizabeth A. Quaglia. 153-168 [doi]
- SoK: Delay-Based CryptographyLiam Medley, Angelique Faye Loe, Elizabeth A. Quaglia. 169-183 [doi]
- Indistinguishability Beyond Diff-Equivalence in ProVerifVincent Cheval, Itsaka Rakotonirina. 184-199 [doi]
- Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol AnalysisCas Cremers, Charlie Jacomme, Philip Lukert. 200-213 [doi]
- Extending the Authentication Hierarchy with One-Way AgreementJohannes Wilson, Mikael Asplund, Niklas Johansson. 214-228 [doi]
- On the (De) centralization of FruitChainsAikaterini-Panagiota Stouka, Thomas Zacharias 0001. 229-244 [doi]
- HoRStify: Sound Security Analysis of Smart ContractsSebastian Holler, Sebastian Biewer, Clara Schneidewind. 245-260 [doi]
- Cross-Chain Swaps with PreferencesEric Chan, Marek Chrobak, Mohsen Lesani. 261-275 [doi]
- Smart Contract Synthesis Modulo HyperpropertiesNorine Coenen, Bernd Finkbeiner, Jana Hofmann, Julia J. Tillman. 276-291 [doi]
- OblivIO: Securing Reactive Programs by Oblivious Execution with Bounded Traffic OverheadsJeppe Fredsgaard Blaabjerg, Aslan Askarov. 292-307 [doi]
- Robust Safety for MoveMarco Patrignani, Sam Blackshear. 308-323 [doi]
- Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified CompilersFarzaneh Derakhshan, Zichao Zhang, Amit Vasudevan, Limin Jia 0001. 324-339 [doi]
- Securing Optimized Code Against Power Side ChannelsRodothea-Myrsini Tsoupidi, Roberto Castañeda Lozano, Elena Troubitsyna, Panagiotis Papadimitratos. 340-355 [doi]
- Formalizing Stack Safety as a Security PropertySean Noble Anderson, Roberto Blanco, Leonidas Lampropoulos, Benjamin C. Pierce, Andrew Tolmach. 356-371 [doi]
- A Generic Framework to Develop and Verify Security Mechanisms at the Microarchitectural Level: Application to Control-Flow IntegrityMatthieu Baty, Pierre Wilke, Guillaume Hiet, Arnaud Fontaine, Alix Trieu. 372-387 [doi]
- Bayes Security: A Not So Average MetricKonstantinos Chatzikokolakis 0001, Giovanni Cherubin, Catuscia Palamidessi, Carmela Troncoso. 388-406 [doi]
- Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical InformationShahnewaz Karim Sakib, George T. Amariucai, Yong Guan. 407-422 [doi]
- Analyzing the Shuffle Model Through the Lens of Quantitative Information FlowMireya Jurado, Ramon G. Gonze, Mário S. Alvim, Catuscia Palamidessi. 423-438 [doi]
- SoK: Model Inversion Attack Landscape: Taxonomy, Challenges, and Future RoadmapSayanton V. Dibbo. 439-456 [doi]
- From Bounded to Unbounded: Privacy Amplification via Shuffling with DummiesShun Takagi, Fumiyuki Kato, Yang Cao 0011, Masatoshi Yoshikawa. 457-472 [doi]
- Investigating Membership Inference Attacks under Data DependenciesThomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum. 473-488 [doi]
- Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHEAdi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini. 489-504 [doi]
- Optimally Hiding Object Sizes with Constrained PaddingAndrew C. Reed, Michael K. Reiter. 505-520 [doi]
- General-Purpose Secure Conflict-free Replicated Data TypesBernardo Portela, Hugo Pacheco 0001, Pedro Jorge, Rogério Pontes. 521-536 [doi]
- $\pi_{\mathbf{RA}}$: A $\pi\text{-calculus}$ for Verifying Protocols that Use Remote AttestationEmiel Lanckriet, Matteo Busi 0001, Dominique Devriese. 537-551 [doi]
- High-Assurance Field Inversion for Curve-Based CryptographyBenjamin Salling Hvass, Diego F. Aranha, Bas Spitters. 552-567 [doi]
- On Sustainable Ring-Based Anonymous SystemsSherman S. M. Chow, Christoph Egger 0001, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo. 568-583 [doi]
- Collusion-Deterrent Threshold Information EscrowEaswar Vivek Mangipudi, Donghang Lu, Alexandros Psomas 0001, Aniket Kate. 584-599 [doi]