Abstract is missing.
- Executing and Proving Over Dirty LedgersChristos Stefo, Zhuolun Xiang, Lefteris Kokoris-Kogias. 3-20 [doi]
- Byzantine Generals in the Permissionless SettingAndrew Lewis-Pye, Tim Roughgarden. 21-37 [doi]
- The Unique Chain Rule and Its ApplicationsAdithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael K. Reiter. 38-55 [doi]
- Player-Replaceability and Forensic Support Are Two Sides of the Same (Crypto) CoinPeiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath. 56-74 [doi]
- Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback GuaranteesGiovanni Deligios, Chen-Da Liu Zhang. 77-93 [doi]
- Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative BlindingIvo Maffei, Andrew William Roscoe. 94-111 [doi]
- Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler ConstructionsMatteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo. 112-128 [doi]
- On the Correlation Complexity of MPC with Cheater IdentificationNicholas Brandt, Sven Maier, Tobias Müller 0005, Jörn Müller-Quade. 129-146 [doi]
- TALUS: Reinforcing TEE Confidentiality with Cryptographic CoprocessorsDhiman Chakraborty 0001, Michael Schwarz 0001, Sven Bugiel. 147-165 [doi]
- Practical Construction for Secure Trick-Taking Games Even with Cards Set AsideRohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade 0001, Charles Olivier-Anclin. 166-181 [doi]
- Signature for Objects: Formalizing How to Authenticate Physical Data and MoreRyuya Hayashi, Taiki Asano, Junichiro Hayata, Takahiro Matsuda, Shota Yamada 0001, Shuichi Katsumata, Yusuke Sakai 0001, Tadanori Teruya, Jacob C. N. Schuldt, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto. 182-199 [doi]
- The Superlinearity Problem in Post-quantum BlockchainsSunoo Park, Nicholas Spooner. 200-217 [doi]
- Fair Delivery of Decentralised Randomness BeaconRunchao Han, Jiangshan Yu. 218-234 [doi]
- Bicorn: An Optimistically Efficient Distributed Randomness BeaconKevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau. 235-251 [doi]
- McFly: Verifiable Encryption to the Future Made PracticalNico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig. 252-269 [doi]
- Eagle: Efficient Privacy Preserving Smart ContractsCarsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen. 270-288 [doi]
- Provably Avoiding Geographic Regions for Tor's Onion ServicesArushi Arora, Raj Karra, Dave Levin, Christina Garman. 289-305 [doi]
- R2: Boosting Liquidity in Payment Channel Networks with Online Admission ControlMahsa Bastankhah, Krishnendu Chatterjee, Mohammad Ali Maddah-Ali, Stefan Schmid 0001, Jakub Svoboda, Michelle Yeo. 309-325 [doi]
- Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBsJason Milionis, Ciamac C. Moallemi, Tim Roughgarden. 326-343 [doi]
- Mitigating Decentralized Finance Liquidations with Reversible Call OptionsKaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais. 344-362 [doi]
- Short Paper: DeFi Deception - Uncovering the Prevalence of Rugpulls in Cryptocurrency ProjectsSharad Agarwal, Gilberto Atondo Siu, Marilyne Ordekian, Alice Hutchings, Enrico Mariconti, Marie Vasek. 363-372 [doi]