Abstract is missing.
- An Upper-Bound on the Decoding Failure Probability of the LRPC DecoderÉtienne Burle, Ayoub Otmani. 3-16 [doi]
- Coset Leaders of the First Order Reed-Muller Codes in the Classes of Niho Functions and Threshold FunctionsClaude Carlet, Serge Feukoua, Ana Salagean. 17-33 [doi]
- Revisiting Nearest-Neighbor-Based Information Set DecodingAndre Esser 0001. 34-54 [doi]
- Feistel Ciphers Based on a Single PrimitiveKento Tsuji, Tetsu Iwata. 57-79 [doi]
- Rectangle Attacks on Reduced Versions of the FBC Block CipherWenchang Zhou, Jiqiang Lu. 80-95 [doi]
- zk-SNARKs from Codes with Rank MetricsXuan Thanh Do, Dang Truong Mac, Quoc Huy Vu. 99-119 [doi]
- Zero-Knowledge Systems from MPC-in-the-Head and Oblivious TransferCyprien Delpech de Saint Guilhem, Ehsan Ebrahimi, Barry Van Leeuwen. 120-136 [doi]
- ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for $\mathbb {Z}_{2^k}$Lennart Braun, Cyprien Delpech de Saint Guilhem, Robin Jadoul, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy. 137-157 [doi]
- Efficient Secure Two Party ECDSASermin Kocaman, Younes Talibi Alaoui. 161-180 [doi]
- Selective Delegation of Attributes in Mercurial Signature CredentialsColin Putman, Keith M. Martin. 181-196 [doi]
- Middle-Products of Skew Polynomials and Learning with ErrorsCong Ling 0001, Andrew Mendelsohn. 199-219 [doi]
- Identity-Based Threshold Signatures from IsogeniesShahla Atapoor. 220-240 [doi]
- Dynamic Security Aspects of Onion RoutingAlessandro Melloni, Martijn Stam, Øyvind Ytrehus. 243-262 [doi]
- Practical and Efficient FHE-Based MPCNigel P. Smart. 263-283 [doi]