Abstract is missing.
- A Refined Hardness Estimation of LWE in Two-Step ModeWenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang. 3-35 [doi]
- A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group ActionsSteven D. Galbraith, Yi-Fu Lai, Hart Montgomery. 36-60 [doi]
- R3PO: Reach-Restricted Reactive Program Obfuscation and Its ApplicationsKaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran 0001, Rajeev Raghunath. 61-91 [doi]
- Selective Opening Security in the Quantum Random Oracle Model, RevisitedJiaxin Pan, Runzhi Zeng. 92-122 [doi]
- On Algebraic Embedding for Unstructured LatticesMadalina Bolboceanu, Zvika Brakerski, Devika Sharma. 123-154 [doi]
- An Algorithm for Efficient Detection of (N, N)-Splittings and Its Application to the Isogeny Problem in Dimension 2Maria Corte-Real Santos, Craig Costello, Sam Frengley. 157-189 [doi]
- SCALLOP-HD: Group Action from 2-Dimensional IsogeniesMingjie Chen, Antonin Leroux, Lorenz Panny. 190-216 [doi]
- New Proof Systems and an OPRF from CSIDHCyprien Delpech de Saint Guilhem, Robi Pedersen. 217-251 [doi]
- On Structure-Preserving Cryptography and LatticesDennis Hofheinz, Kristina Hostáková, Roman Langrehr, Bogdan Ursu. 255-287 [doi]
- Tagged Chameleon Hash from Lattices and Application to Redactable BlockchainYiming Li, Shengli Liu 0001. 288-320 [doi]
- Laconic Branching Programs from the Diffie-Hellman AssumptionSanjam Garg, Mohammad Hajiabadi, Peihan Miao 0001, Alice Murphy. 323-355 [doi]
- Rate-1 Fully Local Somewhere Extractable Hashing from DDHPedro Branco 0005, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto. 356-386 [doi]
- Private Set Operations from Multi-query Reverse Private Membership TestYu Chen 0003, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu. 387-416 [doi]