Abstract is missing.
- Compact Adaptively Secure ABE for \mathsf NC^1 from k-LinLucas Kowalczyk, Hoeteck Wee. 3-33 [doi]
- Unbounded Dynamic Predicate Compositions in Attribute-Based EncryptionNuttapong Attrapadung. 34-67 [doi]
- (R)CCA Secure Updatable Encryption with Integrity ProtectionMichael Klooß, Anja Lehmann, Andy Rupp. 68-99 [doi]
- Aurora: Transparent Succinct Arguments for R1CSEli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, Nicholas P. Ward. 103-128 [doi]
- The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal ProtocolJoël Alwen, Sandro Coretti, Yevgeniy Dodis. 129-158 [doi]
- Efficient Ratcheting: Almost-Optimal Guarantees for Secure MessagingDaniel Jost, Ueli Maurer, Marta Mularczyk. 159-188 [doi]
- Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and InstantiationShweta Agrawal. 191-225 [doi]
- Sum-of-Squares Meets Program Obfuscation, RevisitedBoaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai. 226-250 [doi]
- How to Leverage Hardness of Constant-Degree Expanding Polynomials over \mathbb R R to build i풪 i OAayush Jain, Huijia Lin, Christian Matt 0002, Amit Sahai. 251-281 [doi]
- XOR-Counts and Lightweight Multiplication with Fixed Elements in Binary Finite FieldsLukas Kölsch. 285-312 [doi]
- DLCT: A New Tool for Differential-Linear CryptanalysisAchiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman. 313-342 [doi]
- Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMCItai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger. 343-372 [doi]
- Distributed Differential Privacy via ShufflingAlbert Cheu, Adam D. Smith, Jonathan Ullman, David Zeber, Maxim Zhilyaev. 375-403 [doi]
- Lower Bounds for Differentially Private RAMsGiuseppe Persiano, Kevin Yeo. 404-434 [doi]
- Beyond Birthday Bound Secure MAC in Faulty Nonce ModelAvijit Dutta, Mridul Nandi, Suprita Talnikar. 437-466 [doi]
- Tight Time-Memory Trade-Offs for Symmetric EncryptionJoseph Jaeger, Stefano Tessaro. 467-497 [doi]
- Non-Malleable Codes Against Bounded Polynomial Time TamperingMarshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Huijia Lin, Tal Malkin. 501-530 [doi]
- Continuous Non-Malleable Codes in the 8-Split-State ModelDivesh Aggarwal, Nico Döttling, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto. 531-561 [doi]
- Correlated-Source Extractors and Cryptography with Correlated-Random TapesVipul Goyal, Yifan Song. 562-592 [doi]
- Revisiting Non-Malleable Secret SharingSaikrishna Badrinarayanan, Akshayaram Srinivasan. 593-622 [doi]
- Multi-party Virtual State ChannelsStefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková. 625-656 [doi]
- Aggregate Cash Systems: A Cryptographic Investigation of MimblewimbleGeorg Fuchsbauer, Michele Orrù, Yannick Seurin. 657-689 [doi]
- Proof-of-Stake Protocols for Privacy-Aware BlockchainsChaya Ganesh, Claudio Orlandi, Daniel Tschudi. 690-719 [doi]
- Consensus Through HerdingT.-H. Hubert Chan, Rafael Pass, Elaine Shi. 720-749 [doi]