Abstract is missing.
- QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle ModelXu Liu, Mingqiang Wang. 3-26 [doi]
- An Alternative Approach for SIDH ArithmeticCyril Bouvier, Laurent Imbert. 27-44 [doi]
- The Convergence of Slide-Type ReductionsMichael Walter. 45-67 [doi]
- On the Success Probability of Solving Unique SVP via BKZEamonn W. Postlethwaite, Fernando Virdia. 68-98 [doi]
- Two-Round n-out-of-n and Multi-signatures and Trapdoor Commitment from LatticesIvan Damgård, Claudio Orlandi, Akira Takahashi 0002, Mehdi Tibouchi. 99-130 [doi]
- Isogeny-Based Key Compression Without PairingsGeovandro C. C. F. Pereira, Paulo S. L. M. Barreto. 131-154 [doi]
- Analysis of Multivariate Encryption Schemes: Application to DobMorten Øygarden, Patrick Felke, Håvard Raddum. 155-183 [doi]
- On the Integer Polynomial Learning with Errors ProblemJulien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld. 184-214 [doi]
- Shorter Lattice-Based Zero-Knowledge Proofs via One-Time CommitmentsVadim Lyubashevsky, Ngoc Khanh Nguyen 0001, Gregor Seiler. 215-241 [doi]
- Multivariate Public Key Cryptosystem from Sidon SpacesNetanel Raviv, Ben Langton, Itzhak Tamo. 242-265 [doi]
- Banquet: Short and Fast Signatures from AESCarsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha. 266-297 [doi]
- Improving Revocation for Group Signature with Redactable SignatureOlivier Sanders. 301-330 [doi]
- Bootstrapping Fully Homomorphic Encryption over the Integers in Less than One SecondHilder Vitor Lima Pereira. 331-359 [doi]
- Group Signatures with User-Controlled and Sequential LinkabilityJesus Diaz, Anja Lehmann. 360-388 [doi]
- Impossibility on Tamper-Resilient Cryptography with Uniqueness PropertiesYuyu Wang, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka. 389-420 [doi]
- Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source AttacksQiqi Lai, Feng-Hao Liu, Zhedong Wang. 421-450 [doi]
- Two-Party Adaptor Signatures from Identification SchemesAndreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi 0002. 451-480 [doi]
- Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless SetupTsz Hon Yuen, Handong Cui, Xiang Xie. 481-511 [doi]
- Universal Proxy Re-EncryptionNico Döttling, Ryo Nishimaki. 512-542 [doi]
- Master-Key KDM-Secure ABE via Predicate EncodingShengyuan Feng, Junqing Gong, Jie Chen. 543-572 [doi]
- Exact Lattice Sampling from Non-Gaussian DistributionsMaxime Plançon, Thomas Prest. 573-595 [doi]
- Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision ResistanceTibor Jager, Rafael Kurek, David Niehues. 596-626 [doi]
- Subversion-Resilient Public Key Encryption with Practical WatchdogsPascal Bemmann, Rongmao Chen, Tibor Jager. 627-658 [doi]
- Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without PairingsJulien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung. 659-690 [doi]
- Updatable Signatures and Message Authentication CodesValerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi. 691-723 [doi]
- Multi-Client Functional Encryption for Separable FunctionsMichele Ciampi, Luisa Siniscalchi, Hendrik Waldner. 724-753 [doi]