Abstract is missing.
- On the Existence of Three Round Zero-Knowledge ProofsNils Fleischhacker, Vipul Goyal, Abhishek Jain 0002. 3-33 [doi]
- Statistical Witness Indistinguishability (and more) in Two MessagesYael Tauman Kalai, Dakshita Khurana, Amit Sahai. 34-65 [doi]
- An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-KnowledgePavel Hubácek, Alon Rosen, Margarita Vald. 66-87 [doi]
- Efficient Maliciously Secure Multiparty Computation for RAMMarcel Keller, Avishay Yanai. 91-124 [doi]
- Efficient Circuit-Based PSI via Cuckoo HashingBenny Pinkas, Thomas Schneider 0003, Christian Weinert, Udi Wieder. 125-157 [doi]
- Overdrive: Making SPDZ Great AgainMarcel Keller, Valerio Pastro, Dragos Rotaru. 158-189 [doi]
- Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of KnowledgePyrros Chaidos, Geoffroy Couteau. 193-221 [doi]
- Quasi-Optimal SNARGs via Linear Multi-Prover Interactive ProofsDan Boneh, Yuval Ishai, Amit Sahai, David J. Wu. 222-255 [doi]
- Untagging Tor: A Formal Treatment of Onion EncryptionJean Paul Degabriele, Martijn Stam. 259-293 [doi]
- Exploring the Boundaries of Topology-Hiding ComputationMarshall Ball, Elette Boyle, Tal Malkin, Tal Moran. 294-325 [doi]
- Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and SolutionsKirsten Eisenträger, Sean Hallgren, Kristin E. Lauter, Travis Morrison, Christophe Petit. 329-368 [doi]
- On the Complexity of Simulating Auxiliary InputYi-Hsiu Chen, Kai-Min Chung, Jyun-Jie Liao. 371-390 [doi]
- Fuzzy Password-Authenticated Key ExchangePierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, Sophia Yakoubov. 393-424 [doi]
- Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key ExchangeDavid Derler, Tibor Jager, Daniel Slamanig, Christoph Striecks. 425-455 [doi]
- OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation AttacksStanislaw Jarecki, Hugo Krawczyk, Jiayu Xu. 456-486 [doi]
- Unforgeable Quantum EncryptionGorjan Alagic, Tommaso Gagliardoni, Christian Majenz. 489-519 [doi]
- Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle ModelTsunekazu Saito, Keita Xagawa, Takashi Yamakawa. 520-551 [doi]
- A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle ModelEike Kiltz, Vadim Lyubashevsky, Christian Schaffner. 552-586 [doi]
- Non-malleable Randomness Encoders and Their ApplicationsBhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar. 589-617 [doi]
- Non-malleable Codes from Average-Case Hardness: $${\mathsf {A}}{\mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded TamperingMarshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin. 618-650 [doi]
- Naor-Reingold Goes Public: The Complexity of Known-Key SecurityPratik Soni, Stefano Tessaro. 653-684 [doi]
- Updatable Encryption with Post-Compromise SecurityAnja Lehmann, Björn Tackmann. 685-716 [doi]