Abstract is missing.
- On Removing Graded Encodings from Functional EncryptionNir Bitansky, Huijia Lin, Omer Paneth. 3-29 [doi]
- Functional Encryption: Deterministic to Randomized Functions from Simple AssumptionsShashank Agrawal, David J. Wu. 30-61 [doi]
- Random Sampling Revisited: Lattice Enumeration with Discrete PruningYoshinori Aono, Phong Q. Nguyen. 65-102 [doi]
- On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALMartin R. Albrecht. 103-129 [doi]
- Small CRT-Exponent RSA RevisitedAtsushi Takayasu, Yao Lu, Liqiang Peng. 130-159 [doi]
- Group-Based Secure Computation: Optimizing Rounds, Communication, and ComputationElette Boyle, Niv Gilboa, Yuval Ishai. 163-193 [doi]
- On the Exact Round Complexity of Self-composable Two-Party ComputationSanjam Garg, Susumu Kiyoshima, Omkant Pandey. 194-224 [doi]
- High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest MajorityJun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein. 225-255 [doi]
- Conditional Cube Attack on Reduced-Round Keccak Sponge FunctionSenyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao. 259-288 [doi]
- A New Structural-Differential Property of 5-Round AESLorenzo Grassi 0001, Christian Rechberger, Sondre Rønjom. 289-317 [doi]
- Removing the Strong RSA Assumption from Arguments over the IntegersGeoffroy Couteau, Thomas Peters, David Pointcheval. 321-350 [doi]
- Magic Adversaries Versus Individual Reduction: Science Wins Either WayYi Deng. 351-377 [doi]
- The Multi-user Security of Double EncryptionViet Tung Hoang, Stefano Tessaro. 381-411 [doi]
- Public-Seed Pseudorandom PermutationsPratik Soni, Stefano Tessaro. 412-441 [doi]
- Cryptography with UpdatesPrabhanjan Ananth, Aloni Cohen, Abhishek Jain. 445-472 [doi]
- Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, RevisitedYevgeniy Dodis, Siyao Guo, Jonathan Katz. 473-495 [doi]
- Modifying an Enciphering Scheme After DeploymentPaul Grubbs, Thomas Ristenpart, Yuval Yarom. 499-527 [doi]
- Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionRishab Goyal, Venkata Koppula, Brent Waters. 528-557 [doi]
- Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security NotionsMohammad Hajiabadi, Bruce M. Kapron. 561-591 [doi]
- A Note on Perfect Correctness by DerandomizationNir Bitansky, Vinod Vaikuntanathan. 592-606 [doi]
- Decentralized Anonymous MicropaymentsAlessandro Chiesa, Matthew Green 0001, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra. 609-642 [doi]
- Analysis of the Blockchain Protocol in Asynchronous NetworksRafael Pass, Lior Seeman, Abhi Shelat. 643-673 [doi]