Abstract is missing.
- Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact TracingKrzysztof Pietrzak. 3-15 [doi]
- Proof-of-Reputation Blockchain with Nakamoto FallbackLeonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas. 16-38 [doi]
- Transciphering, Using FiLIP and TFHE for an Efficient Delegation of ComputationClément Hoffmann, Pierrick Méaux, Thomas Ricosset. 39-61 [doi]
- Encrypted Key-Value StoresArchita Agarwal, Seny Kamara. 62-85 [doi]
- Formal Verification of Fair Exchange Based on Bitcoin Smart ContractsCheng Shi, Kazuki Yoneyama. 89-106 [doi]
- Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time VerificationJosé Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Vincent Laporte, Tiago Oliveira 0004. 107-127 [doi]
- Protocol Analysis with TimeDamián Aparicio-Sánchez, Santiago Escobar 0001, Catherine A. Meadows, José Meseguer, Julia Sapiña. 128-150 [doi]
- Verifpal: Cryptographic Protocol Analysis for the Real WorldNadim Kobeissi, Georgio Nicolas, Mukesh Tiwari. 151-202 [doi]
- On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded DevicesMelissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, Vincent Verneuil. 205-227 [doi]
- Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448Mojtaba Bisheh Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani. 228-247 [doi]
- Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in CryptographyAbhraneel Dutta, Aaron Hutchinson, Koray Karabina. 248-270 [doi]
- Cryptanalysis of the Permutation Based Algorithm SpoCLiliya Kraleva, Raluca Posteuca, Vincent Rijmen. 273-293 [doi]
- More Glimpses of the RC4 Internal State ArrayPranab Chakraborty, Subhamoy Maitra. 294-311 [doi]
- Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-BoxLorenzo Grassi 0001, Markus Schofnegger. 312-331 [doi]
- Counting Active S-Boxes is not EnoughOrr Dunkelman, Abhishek Kumar 0002, Eran Lambooij, Somitra Kumar Sanadhya. 332-344 [doi]
- Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block CiphersMaria Eichlseder, Gregor Leander, Shahram Rasoolzadeh. 345-369 [doi]
- Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-Key SettingsCarlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim. 373-394 [doi]
- Evaluation of Quantum Cryptanalysis on SPECKRavi Anand, Arpita Maitra, Sourav Mukhopadhyay. 395-413 [doi]
- Making the BKW Algorithm Practical for LWEAlessandro Budroni, Qian Guo 0001, Thomas Johansson 0001, Erik Mårtensson, Paul Stankovski Wagner. 417-439 [doi]
- On a Dual/Hybrid Approach to Small Secret LWE - A Dual/Enumeration Technique for Learning with Errors and Application to Security Estimates of FHE SchemesThomas Espitau, Antoine Joux, Natalia Kharchenko. 440-462 [doi]
- Adaptively Secure Threshold Symmetric-Key EncryptionPratyay Mukherjee. 465-487 [doi]
- Vetted EncryptionMartha Norberg Hovd, Martijn Stam. 488-507 [doi]
- Security of Public Key Encryption Against Resetting AttacksJuliane Krämer, Patrick Struck. 508-528 [doi]
- The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-rewinding Proofs for Schnorr Identification and SignaturesMihir Bellare, Wei Dai. 529-552 [doi]
- Skipping the q in Group SignaturesOlivier Blazy, Saqib A. Kakvi. 553-575 [doi]
- Incremental Cryptography Revisited: PRFs, Nonces and Modular DesignVivek Arte, Mihir Bellare, Louiza Khati. 576-598 [doi]
- Gadget-Based iNTRU Lattice TrapdoorsNicholas Genise, Baiyu Li. 601-623 [doi]
- Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard ModelGiang Linh Duc Nguyen, Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Fuchun Guo. 624-643 [doi]
- Efficient Attribute-Based Proxy Re-Encryption with Constant Size CiphertextsArinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan. 644-665 [doi]
- Adaptive-Secure Identity-Based Inner-Product Functional Encryption and Its Leakage-ResilienceLinru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu. 666-690 [doi]
- CCA-Secure ABE Using Tag and Pair EncodingOlivier Blazy, Sayantan Mukherjee. 691-714 [doi]
- Simpler Constructions of Asymmetric Primitives from ObfuscationPooya Farshim, Georg Fuchsbauer, Alain Passelègue. 715-738 [doi]
- Adaptive Security of Practical Garbling SchemesZahra Jafargholi, Sabine Oechsner. 741-762 [doi]
- Constructive t-secure Homomorphic Secret Sharing for Low Degree PolynomialsKittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura. 763-785 [doi]
- Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)Ashish Choudhury, Nikhil Pappu. 786-809 [doi]
- Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-party ComputationAshish Choudhury. 810-831 [doi]
- High Throughput Secure MPC over Small Population in Hybrid Networks (Extended Abstract)Ashish Choudhury, Aditya Hegde 0003. 832-855 [doi]
- Dual-Mode NIZKs: Possibility and Impossibility Results for Property TransferVivek Arte, Mihir Bellare. 859-881 [doi]
- On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret EqualityKyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe. 882-904 [doi]