Abstract is missing.
- Revisiting Oblivious Top-k Selection with Applications to Secure k-NN ClassificationKelong Cong, Robin Geelen, Jiayi Kang, Jeongeun Park 0001. 3-25 [doi]
- Simulation Secure Multi-input Quadratic Functional EncryptionFerran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie. 26-53 [doi]
- Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver TriplesVincent Rieder. 54-83 [doi]
- Multi-key Homomorphic Encryption with Threshold Re-encryptionAkira Nakashima, Yukimasa Sugizaki, Hikaru Tsuchida 0001, Takuya Hayashi 0001, Koji Nuida, Kengo Mori, Toshiyuki Isshiki. 84-104 [doi]
- Multi-user Dynamic Searchable Encryption for Prefix-Fixing Predicates from Symmetric-Key PrimitivesTakato Hirano, Yutaka Kawai, Yoshihiro Koseki, Satoshi Yasuda, Yohei Watanabe 0001, Takumi Amada, Mitsugu Iwamoto, Kazuo Ohta. 105-127 [doi]
- BUFFing FALCON Without Increasing the Signature SizeSamed Düzlü, Rune Fiedler, Marc Fischlin. 131-150 [doi]
- SILBE: An Updatable Public Key Encryption Scheme from Lollipop AttacksMax Duparc, Tako Boris Fouotsa, Serge Vaudenay. 151-177 [doi]
- Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and Their Isogeny-Based ApplicationsBruno Sterner. 178-202 [doi]
- Bias from Uniform Nonce: Revised Fourier Analysis-Based Attack on ECDSAShunsuke Osaki, Noboru Kunihiro. 205-229 [doi]
- Multivariate Blind Signatures RevisitedWard Beullens. 230-236 [doi]
- Post-Quantum Backdoor for Kyber-KEMWenwen Xia, Geng Wang, Dawu Gu. 237-255 [doi]
- Identity-Based Encryption from Lattices with More Compactness in the Standard ModelWeidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang, Dawu Gu. 259-281 [doi]
- Oblivious Identity-Based Encryption - (IBE Secure Against an Adversarial KGC)Aikaterini Mitrokotsa, Sayantan Mukherjee, Jenit Tomy. 282-309 [doi]