Abstract is missing.
- Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRankDaniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui. 1-25 [doi]
- Compilation of Function Representations for Secure Computing ParadigmsKarim Baghery, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy. 26-50 [doi]
- Oblivious TLS via Multi-party ComputationDamiano Abram, Ivan Damgård, Peter Scholl, Sven Trieflinger. 51-74 [doi]
- Noisy Simon Period FindingAlexander May 0001, Lars Schlieper, Jonathan Schwinger. 75-99 [doi]
- A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based EncryptionMarloes Venema, Greg Alpár. 100-125 [doi]
- Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and TweakeysChao Niu, Muzhou Li, Siwei Sun, Meiqin Wang. 126-147 [doi]
- SoK: Game-Based Security Models for Group Key ExchangeBertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila. 148-176 [doi]
- EPID with Malicious RevocationOlivier Sanders, Jacques Traoré. 177-200 [doi]
- Signed Diffie-Hellman Key Exchange with Tight SecurityJiaxin Pan, Chen Qian, Magnus Ringerud. 201-226 [doi]
- Lattice-Based Proof of Shuffle and Applications to Electronic VotingDiego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge. 227-251 [doi]
- More Efficient Shuffle Argument from Unique FactorizationToomas Krips, Helger Lipmaa. 252-275 [doi]
- Cryptanalysis of a Dynamic Universal Accumulator over Bilinear GroupsAlex Biryukov, Aleksei Udovenko, Giuseppe Vitto. 276-298 [doi]
- FAN: A Lightweight Authenticated Cryptographic AlgorithmLin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, Shaoyu Du. 299-325 [doi]
- Related-Key Analysis of Generalized Feistel Networks with Expanding Round FunctionsYuqing Zhao, Wenqi Yu, Chun Guo. 326-350 [doi]
- The Key-Dependent Message Security of Key-Alternating Feistel CiphersPooya Farshim, Louiza Khati, Yannick Seurin, Damien Vergnaud. 351-374 [doi]
- Mesh Messaging in Large-Scale Protests: Breaking BridgefyMartin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková. 375-398 [doi]
- Inverse-Sybil Attacks in Automated Contact TracingBenedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter 0001, Michelle Yeo. 399-421 [doi]
- On the Effectiveness of Time Travel to Inject COVID-19 AlertsVincenzo Iovino, Serge Vaudenay, Martin Vuagnoux. 422-443 [doi]
- SoK: How (not) to Design and Implement Post-quantum CryptographyJames Howe, Thomas Prest, Daniel Apon. 444-477 [doi]
- Dual Lattice Attacks for Closest Vector Problems (with Preprocessing)Thijs Laarhoven, Michael Walter 0001. 478-502 [doi]
- On the Hardness of Module-LWE with Binary SecretKatharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen. 503-526 [doi]
- Multi-party Revocation in Sovrin: Performance through Distributed TrustLukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch. 527-551 [doi]
- Balancing Privacy and Accountability in Blockchain Identity ManagementIvan Damgård, Chaya Ganesh, Hamidreza Khoshakhlagh, Claudio Orlandi, Luisa Siniscalchi. 552-576 [doi]
- Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr SignaturesKonstantinos Chalkias, François Garillot, Yashvanth Kondi, Valeria Nikolaenko. 577-608 [doi]
- A Framework to Optimize Implementations of MatricesDa Lin, Zejun Xiang 0001, Xiangyong Zeng, Shasha Zhang. 609-632 [doi]
- Improvements to RSA Key Generation and CRT on Embedded DevicesMike Hamburg, Mike Tunstall, Qinglai Xiao. 633-656 [doi]
- On the Cost of ASIC Hardware Crackers: A SHA-1 Case StudyAnupam Chattopadhyay, Mustafa Khairallah, Gaëtan Leurent, Zakaria Najm, Thomas Peyrin, Vesselin Velichkov. 657-681 [doi]