Abstract is missing.
- Batch Codes from Affine Cartesian Codes and Quotient SpacesTravis Baumbaugh, Haley Colgate, Timothy Jackman, Felice Manganiello. 3-15 [doi]
- Structural Properties of Self-dual Monomial Codes with Application to Code-Based CryptographyVlad-Florin Dragoi, Andreea Szocs. 16-41 [doi]
- Cryptanalysis of the Rank Preserving SignatureNicolas Aragon, Maxime Bros, Philippe Gaborit. 45-58 [doi]
- Attacks on a Privacy-Preserving Publish-Subscribe System and a Ride-Hailing ServiceSrinivas Vivek 0001. 59-71 [doi]
- Tightness Subtleties for Multi-user PKE NotionsHans Heum, Martijn Stam. 75-104 [doi]
- Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and AuthenticationHirokazu Kobayashi, Yohei Watanabe 0001, Junji Shikata. 105-128 [doi]
- Optimizing Registration Based EncryptionKelong Cong, Karim Eldefrawy, Nigel P. Smart. 129-157 [doi]
- A Note on Quantum Collision Resistance of Double-Block-Length Compression FunctionsShoichi Hirose, Hidenori Kuwakado. 161-175 [doi]
- An Isogeny-Based ID Protocol Using Structured Public KeysKarim Baghery, Daniele Cozzo, Robi Pedersen. 179-197 [doi]
- An Extension of Kannan's Embedding for Solving Ring-Based LWE ProblemsSatoshi Nakamura 0004, Masaya Yasuda. 201-219 [doi]
- Black-Box Accumulation Based on LatticesSebastian H. Faller, Pascal Baumer, Michael Klooß, Alexander Koch 0001, Astrid Ottenhues, Markus Raiber. 220-246 [doi]
- How to Find Ternary LWE Keys Using Locality Sensitive HashingElena Kirshanova, Alexander May 0001. 247-264 [doi]
- When HEAAN Meets FV: A New Somewhat Homomorphic Encryption with Reduced Memory OverheadHao Chen 0030, Ilia Iliashenko, Kim Laine. 265-285 [doi]
- Secure Multiparty Computation in the Bounded Storage ModelJiahui Liu, Satyanarayana Vusirikala. 289-325 [doi]