Abstract is missing.
- Practical Sharing of Quantum Secrets over Untrusted ChannelsDamian Markham, Anne Marin. 1-14 [doi]
- Generalizing Efficient Multiparty ComputationBernardo Machado David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp. 15-32 [doi]
- Round-Optimal Perfectly Secret Message Transmission with Linear Communication ComplexityRavi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Srinathan Kannan. 33-50 [doi]
- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for CircuitsNing Ding. 51-68 [doi]
- Unifying Leakage Classes: Simulatable Leakage and PseudoentropyBenjamin Fuller, Ariel Hamlin. 69-86 [doi]
- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient ComputationIvan Damgård, Frédéric Dupuis, Jesper Buus Nielsen. 87-104 [doi]
- Metric Pseudoentropy: Characterizations, Transformations and ApplicationsMaciej Skorski. 105-122 [doi]
- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to PseudoentropyMaciej Skorski. 123-140 [doi]
- Gambling, Computational Information and Encryption SecurityMohammad Hajiabadi, Bruce M. Kapron. 141-158 [doi]
- Query-Complexity Amplification for Random OraclesGrégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann. 159-180 [doi]
- The Chaining Lemma and Its ApplicationIvan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi. 181-196 [doi]
- Weakening the Isolation Assumption of Tamper-Proof Hardware TokensRafael Dowsley, Jörn Müller-Quade, Tobias Nilges. 197-213 [doi]
- Limited View Adversary Codes: Bounds, Constructions and ApplicationsPengwei Wang, Reihaneh Safavi-Naini. 214-235 [doi]
- Locally Decodable Codes for Edit DistanceRafail Ostrovsky, Anat Paskin-Cherniavsky. 236-249 [doi]
- The Multivariate Hidden Number ProblemSteven D. Galbraith, Barak Shani. 250-268 [doi]
- Lattice Point Enumeration on Block Reduced BasesMichael Walter. 269-282 [doi]
- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption SchemesRicardo Dahab, Steven Galbraith, Eduardo Morais. 283-296 [doi]