Abstract is missing.
- Collusion Resistant Broadcast and Trace from Positional Witness EncryptionRishab Goyal, Satyanarayana Vusirikala, Brent Waters. 3-33 [doi]
- Break-glass EncryptionAlessandra Scafuro. 34-62 [doi]
- Registration-Based Encryption from Standard AssumptionsSanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar. 63-93 [doi]
- FE for Inner Products and Its Application to Decentralized ABEZhedong Wang, Xiong Fan, Feng-Hao Liu. 97-127 [doi]
- Decentralizing Inner-Product Functional EncryptionMichel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner. 128-157 [doi]
- Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCRShuichi Katsumata, Shota Yamada 0001. 158-188 [doi]
- Function Private Predicate Encryption for Low Min-Entropy PredicatesSikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna. 189-219 [doi]
- Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1Nuttapong Attrapadung, Takahiro Matsuda 0002, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa. 223-253 [doi]
- Obfuscating Simple Functionalities from Knowledge AssumptionsWard Beullens, Hoeteck Wee. 254-283 [doi]
- What About Bob? The Inadequacy of CPA Security for Proxy ReencryptionAloni Cohen. 287-316 [doi]
- Adaptively Secure Proxy Re-encryptionGeorg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak. 317-346 [doi]
- Generic Constructions of Robustly Reusable Fuzzy ExtractorYunhua Wen, Shengli Liu, Dawu Gu. 349-378 [doi]
- Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter ValidationSteven D. Galbraith, Jake Massimo, Kenneth G. Paterson. 379-407 [doi]
- Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short ProofsLisa Kohl. 408-437 [doi]
- Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure ResistanceShuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu. 441-471 [doi]
- Towards Non-Interactive Zero-Knowledge for NP from LWERon D. Rothblum, Adam Sealfon, Katerina Sotiraki. 472-503 [doi]
- More Efficient Algorithms for the NTRU Key Generation Using the Field NormThomas Pornin, Thomas Prest. 504-533 [doi]
- Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based CryptoTobias Schneider 0002, Clara Paglialonga, Tobias Oder, Tim Güneysu. 534-564 [doi]
- Decryption Failure Attacks on IND-CCA Secure Lattice-Based SchemesJan-Pieter D'Anvers, Qian Guo 0001, Thomas Johansson 0001, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede. 565-598 [doi]
- Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via PermutationsZhe Li, Chaoping Xing, Sze-Ling Yeo. 599-617 [doi]
- Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle ModelHaodong Jiang, Zhenfeng Zhang, Zhi Ma. 618-645 [doi]
- Factoring Products of Braids via Garside Normal FormSimon-Philipp Merz, Christophe Petit. 646-678 [doi]