Abstract is missing.
- A Public Key Identity-Based Revocation Scheme: - Fully Attribute-Hiding and Function PrivateOlivier Blazy, Sayantan Mukherjee. 3-24 [doi]
- Computational Security Analysis of the Full EDHOC ProtocolLoïc Ferreira. 25-48 [doi]
- The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher ModelYusuke Naito 0001. 51-77 [doi]
- Automated-Based Rebound Attacks on ACE PermutationJiali Shi, Guoqiang Liu, Chao Li, Yingxin Li. 78-111 [doi]
- The Exact Multi-user Security of 2-Key Triple DESYusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001. 112-135 [doi]
- Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block CipherJiqiang Lu, Wenchang Zhou. 136-159 [doi]
- Batch Signatures, RevisitedCarlos Aguilar Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano. 163-186 [doi]
- History-Free Sequential Aggregation of Hash-and-Sign SignaturesAlessio Meneghetti, Edoardo Signorini. 187-223 [doi]
- Attribute-Based Signatures with Advanced Delegation, and TracingCécile Delerablée, Lénaïck Gouriou, David Pointcheval. 224-248 [doi]
- Lattice-Based Threshold, Accountable, and Private SignatureYingfei Yan, Yongjun Zhao 0001, Wen Gao, Baocang Wang. 249-274 [doi]
- TFHE Public-Key Encryption RevisitedMarc Joye. 277-291 [doi]
- Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic EncryptionTabitha Ogilvie. 292-315 [doi]
- Identity-Based Encryption from LWE with More Compact Master Public KeyParhat Abla. 319-353 [doi]
- Towards Compact Identity-Based Encryption on Ideal LatticesHuiwen Jia, Yupu Hu, Chunming Tang, Lin Wang. 354-378 [doi]
- Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom FunctionsChristoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer. 381-403 [doi]
- Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum ComputationIslam Faisal. 404-429 [doi]
- SoK: Parameterization of Fault Adversary Models Connecting Theory and PracticeDilara Toprakhisar, Svetla Nikova, Ventzislav Nikov. 433-459 [doi]
- Cutting the GRASS: Threshold GRoup Action Signature SchemesMichele Battagliola, Giacomo Borin, Alessio Meneghetti, Edoardo Persichetti. 460-489 [doi]