Abstract is missing.
- A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective HashingBehzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig. 1-21 [doi]
- Subverting Decryption in AEADMarcel Armour, Bertram Poettering. 22-41 [doi]
- Subversion-Resistant Simulation (Knowledge) Sound NIZKsKarim Baghery. 42-63 [doi]
- 2Rowena Alma L. Betty, Akihiro Munemasa. 64-77 [doi]
- A Framework for Universally Composable Oblivious Transfer from One-Round Key-ExchangePedro Branco 0005, Jintai Ding, Manuel Goulão, Paulo Mateus. 78-101 [doi]
- Efficient Fully Secure Leakage-Deterring EncryptionJan Camenisch, Maria Dubovitskaya, Patrick Towa. 102-127 [doi]
- Sharing the LUOV: Threshold Post-quantum SignaturesDaniele Cozzo, Nigel P. Smart. 128-153 [doi]
- Commodity-Based 2PC for Arithmetic CircuitsIvan Damgård, Helene Haagh, Michael Nielsen 0001, Claudio Orlandi. 154-177 [doi]
- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple CollisionsClaire Delaplace, Andre Esser, Alexander May 0001. 178-199 [doi]
- Forgery Attacks on FlexAE and FlexAEADMaria Eichlseder, Daniel Kales, Markus Schofnegger. 200-214 [doi]
- Key Recovery Attacks on Some Rank Metric Code-Based SignaturesTerry Shue Chien Lau, Chik-How Tan, Theo Fanuela Prabowo. 215-235 [doi]
- On the Security of Multikey Homomorphic EncryptionHyang-Sook Lee, Jeongeun Park. 236-251 [doi]
- RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative RelationsRamiro Martínez, Paz Morillo. 252-277 [doi]
- Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted DataShyam Murthy, Srinivas Vivek. 278-294 [doi]
- Quantum-Secure (Non-)Sequential Aggregate Message Authentication CodesShingo Sato, Junji Shikata. 295-316 [doi]
- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher ModelShingo Sato, Junji Shikata. 317-341 [doi]
- Distributing Any Elliptic Curve Based ProtocolNigel P. Smart, Younes Talibi Alaoui. 342-366 [doi]