Abstract is missing.
- (One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption SchemesJan-Pieter D'Anvers, Mélissa Rossi, Fernando Virdia. 3-33 [doi]
- Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU LatticesPierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu. 34-63 [doi]
- An Algebraic Attack on Rank Metric Code-Based CryptosystemsMagali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Vincent Neiger, Olivier Ruatta, Jean-Pierre Tillich. 64-93 [doi]
- 0.65n with Polynomial MemoryAndre Esser, Alexander May 0001. 94-122 [doi]
- Continuous Verifiable Delay FunctionsNaomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass. 125-154 [doi]
- Generic-Group Delay Functions Require Hidden-Order GroupsLior Rotem, Gil Segev 0001, Ido Shahaf. 155-180 [doi]
- Sigma Protocols for MQ, PKP and SIS, and Fishy Signature SchemesWard Beullens. 183-211 [doi]
- Signatures from Sequential-OR ProofsMarc Fischlin, Patrick Harasser, Christian Janson. 212-244 [doi]
- 1 and Towards NLHuijia Lin, Ji Luo. 247-277 [doi]
- Adaptively Secure ABE for DFA from k-Lin and MoreJunqing Gong, Hoeteck Wee. 278-308 [doi]
- Tornado: Automatic Generation of Probing-Secure Masked Bitsliced ImplementationsSonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff. 311-341 [doi]
- Side-Channel Masking with Pseudo-Random GeneratorJean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun. 342-375 [doi]
- Compact NIZKs from Standard Assumptions on Bilinear MapsShuichi Katsumata, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa. 379-409 [doi]
- New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and MoreBenoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu. 410-441 [doi]
- Non-interactive Zero-Knowledge in Pairing-Free Groups from Weaker AssumptionsGeoffroy Couteau, Shuichi Katsumata, Bogdan Ursu. 442-471 [doi]
- Everybody's a Target: Scalability in Public-Key EncryptionBenedikt Auerbach, Federico Giacon, Eike Kiltz. 475-506 [doi]
- Security Under Message-Derived Keys: Signcryption in iMessageMihir Bellare, Igors Stepanovs. 507-537 [doi]
- Double-Base Chains for Scalar Multiplications on Elliptic CurvesWei Yu 0008, Saud Al Musa, Bao Li. 538-565 [doi]
- Stacked Garbling for Disjunctive Zero-Knowledge ProofsDavid Heath, Vladimir Kolesnikov. 569-598 [doi]
- Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions?Carmit Hazay, Rafael Pass, Muthuramakrishnan Venkitasubramaniam. 599-619 [doi]
- Statistical ZAPR Arguments from Bilinear MapsAlex Lombardi, Vinod Vaikuntanathan, Daniel Wichs. 620-641 [doi]
- Statistical ZAP ArgumentsSaikrishna Badrinarayanan, Rex Fernando, Aayush Jain 0002, Dakshita Khurana, Amit Sahai. 642-667 [doi]
- Statistical Zaps and New Oblivious Transfer ProtocolsVipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta. 668-699 [doi]
- Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA SecurityVeronika Kuchta, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Shifeng Sun. 703-728 [doi]
- Secure Multi-party Quantum Computation with a Dishonest MajorityYfke Dulek, Alex B. Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner. 729-758 [doi]
- Efficient Simulation of Random States and Random UnitariesGorjan Alagic, Christian Majenz, Alexander Russell. 759-787 [doi]
- Quantum-Access-Secure Message Authentication via Blind-UnforgeabilityGorjan Alagic, Christian Majenz, Alexander Russell, Fang Song 0001. 788-817 [doi]