Abstract is missing.
- Non-interactive Zero Knowledge from Sub-exponential DDHAbhishek Jain 0002, Zhengzhong Jin. 3-32 [doi]
- On the (in)security of ROSFabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, Mariana Raykova 0001. 33-53 [doi]
- New Representations of the AES Key ScheduleGaëtan Leurent, Clara Pernot. 54-84 [doi]
- Analysing the HPKE StandardJoël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel. 87-116 [doi]
- Tightly-Secure Authenticated Key Exchange, RevisitedTibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge. 117-146 [doi]
- Aggregatable Distributed Key GenerationKobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu. 147-176 [doi]
- Decentralized Multi-authority ABE for DNFs from LWEPratish Datta, Ilan Komargodski, Brent Waters. 177-209 [doi]
- Compact, Efficient and UC-Secure Isogeny-Based Oblivious TransferYi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem. 213-241 [doi]
- One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based ProtocolsPéter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper. 242-271 [doi]
- Sieving for Twin Smooth Integers with Solutions to the Prouhet-Tarry-Escott ProblemCraig Costello, Michael Meyer, Michael Naehrig. 272-301 [doi]
- Delay EncryptionJeffrey Burdges, Luca De Feo. 302-326 [doi]
- The Nested Subset Differential Attack - A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 MinutesJintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang. 329-347 [doi]
- Improved Cryptanalysis of UOV and RainbowWard Beullens. 348-373 [doi]
- Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)Itai Dinur. 374-403 [doi]
- Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard AssumptionsShuichi Katsumata, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa. 404-434 [doi]
- Post-Quantum Multi-Party ComputationAmit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta. 435-464 [doi]
- n/2-Time Algorithm for $\sqrt{n}$-SVP and $\sqrt{n}$-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVPDivesh Aggarwal, Zeyong Li, Noah Stephens-Davidowitz. 467-497 [doi]
- New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption - Stronger Security and Smaller CiphertextsQiqi Lai, Feng-Hao Liu, Zhedong Wang. 498-527 [doi]
- On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number ProblemMartin R. Albrecht, Nadia Heninger. 528-558 [doi]
- On the Ideal Shortest Vector Problem over Random Rational PrimesYanbin Pan, Jun Xu 0022, Nick Wadleigh, Qi Cheng. 559-583 [doi]
- Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-sparse KeysJean-Philippe Bossuat, Christian Mouchet, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux. 587-617 [doi]
- High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine FunctionJoon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No. 618-647 [doi]
- On the Security of Homomorphic Encryption on Approximate NumbersBaiyu Li, Daniele Micciancio. 648-677 [doi]
- The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OTClaudio Orlandi, Peter Scholl, Sophia Yakoubov. 678-708 [doi]
- Improved Linear Approximations to ARX Ciphers and Attacks Against ChaChaMurilo Coutinho, Tertuliano C. Souza Neto. 711-740 [doi]
- Rotational Cryptanalysis from a Differential-Linear Perspective - Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and AlzetteYunwen Liu, Siwei Sun, Chao Li. 741-770 [doi]
- Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like HashingZhenzhen Bao, Xiaoyang Dong, Jian Guo 0001, Zheng Li 0008, Danping Shi, Siwei Sun, Xiaoyun Wang 0001. 771-804 [doi]
- A Deeper Look at Machine Learning-Based CryptanalysisAdrien Benamira, David Gérault, Thomas Peyrin, Quan Quan Tan. 805-835 [doi]