Abstract is missing.
- Indistinguishable Predictions and Multi-group Fair LearningGuy N. Rothblum. 3-21 [doi]
- Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant LocalityAkin Ünal. 25-54 [doi]
- Fine-Grained Non-interactive Key-Exchange: Constructions and Lower BoundsAbtin Afshar, Geoffroy Couteau, Mohammad Mahmoody, Elahe Sadeghi. 55-85 [doi]
- Speak Much, Remember Little: Cryptography in the Bounded Storage Model, RevisitedYevgeniy Dodis, Willy Quach, Daniel Wichs. 86-116 [doi]
- Non-uniformity and Quantum Advice in the Quantum Random Oracle ModelQipeng Liu. 117-143 [doi]
- Black-Box Separations for Non-interactive Classical Commitments in a Quantum WorldKai-Min Chung, Yao-Ting Lin, Mohammad Mahmoody. 144-172 [doi]
- On Non-uniform Security for Black-Box Non-interactive CCA CommitmentsRachit Garg 0001, Dakshita Khurana, George Lu, Brent Waters. 173-204 [doi]
- Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum i풪Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai. 205-235 [doi]
- Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-KnowledgeSuvradip Chakraborty, Chaya Ganesh, Pratik Sarkar. 239-270 [doi]
- Oblivious Transfer with Constant Computational OverheadElette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl. 271-302 [doi]
- Endemic Oblivious Transfer via Random Oracles, RevisitedZhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren 0001. 303-329 [doi]
- Half-Tree: Halving the Cost of Tree Expansion in COT and DPFXiaojie Guo 0004, Kang Yang 0002, Xiao Wang 0012, Wenhao Zhang, Xiang Xie, Jiang Zhang 0001, Zheli Liu. 330-362 [doi]
- A New Framework for Quantum Oblivious TransferAmit Agarwal, James Bartusek, Dakshita Khurana, Nishant Kumar 0001. 363-394 [doi]
- Optimal Single-Server Private Information RetrievalMingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi. 395-425 [doi]
- Weighted Oblivious RAM, with Applications to Searchable Symmetric EncryptionLéonard Assouline, Brice Minaud. 426-455 [doi]
- NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ OverheadAndrew Park, Wei-Kai Lin, Elaine Shi. 456-486 [doi]
- Lower Bound Framework for Differentially Private and Oblivious Data StructuresGiuseppe Persiano, Kevin Yeo. 487-517 [doi]
- Lower Bounds for (Batch) PIR with Private PreprocessingKevin Yeo. 518-550 [doi]
- How to Compress Encrypted DataNils Fleischhacker, Kasper Green Larsen, Mark Simkin 0001. 551-577 [doi]
- Public Key Encryption with Secure Key LeasingShweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa. 581-610 [doi]
- Another Round of Breaking and Making Quantum Money: - How to Not Build It from Lattices, and MoreJiahui Liu, Hart Montgomery, Mark Zhandry. 611-638 [doi]
- From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and CommitmentsMinki Hhan, Tomoyuki Morimae, Takashi Yamakawa. 639-667 [doi]