Abstract is missing.
- Decoding McEliece with a Hint - Secret Goppa Key Parts Reveal EverythingElena Kirshanova, Alexander May 0001. 3-20 [doi]
- Cost-Asymmetric Memory Hard Password HashingWenjie Bai, Jeremiah Blocki, Mohammad Hassan Ameri. 21-44 [doi]
- Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable CodesMohammad Hassan Ameri, Alexander R. Block, Jeremiah Blocki. 45-68 [doi]
- RAMus- A New Lightweight Block Cipher for RAM EncryptionRaluca Posteuca, Vincent Rijmen. 69-92 [doi]
- Higher-Order Masked SaberSuparna Kundu, Jan-Pieter D'Anvers, Michiel Van Beirendonck, Angshuman Karmakar, Ingrid Verbauwhede. 93-116 [doi]
- Approximate Distance-Comparison-Preserving Symmetric EncryptionGeorg Fuchsbauer, Riddhi Ghosal, Nathan Hauke, Adam O'Neill. 117-144 [doi]
- Key-Policy ABE with Switchable AttributesCécile Delerablée, Lénaïck Gouriou, David Pointcheval. 147-171 [doi]
- Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key EncryptionAntonio Faonio, Luigi Russo. 172-196 [doi]
- New and Improved Constructions for Partially Equivocable Public Key EncryptionBenoît Libert, Alain Passelègue, Mahshid Riahinia. 197-219 [doi]
- On Access Control Encryption Without SanitizationCecilia Boschini, Ivan Damgård, Claudio Orlandi. 220-243 [doi]
- Watermarkable Public Key Encryption with Efficient Extraction Under Standard AssumptionsFoteini Baldimtsi, Aggelos Kiayias, Katerina Samari. 244-267 [doi]
- A Provably Secure, Lightweight Protocol for Anonymous AuthenticationJonathan Katz. 271-288 [doi]
- Anonymous Authenticated CommunicationFabio Banfi, Ueli Maurer. 289-312 [doi]
- Credential Transparency SystemMelissa Chase, Georg Fuchsbauer, Esha Ghosh, Antoine Plouviez. 313-335 [doi]
- Cumulatively All-Lossy-But-One Trapdoor Functions from Standard AssumptionsBenoît Libert, Ky Nguyen, Alain Passelègue. 336-361 [doi]
- On the Related-Key Attack Security of Authenticated Encryption SchemesSebastian Faust, Juliane Krämer, Maximilian Orlt, Patrick Struck. 362-386 [doi]
- The State of the Union: Union-Only Signatures for Data AggregationDiego F. Aranha, Felix Engelmann, Sebastian Kolby, Sophia Yakoubov. 387-410 [doi]
- Traceable Constant-Size Multi-authority CredentialsChloé Hébant, David Pointcheval. 411-434 [doi]
- 3-Party Distributed ORAM from Oblivious Set MembershipBrett Hemenway Falk, Daniel Noble, Rafail Ostrovsky. 437-461 [doi]
- Finding One Common Item, PrivatelyTyler Beauregard, Janabel Xia, Mike Rosulek. 462-480 [doi]
- mrNISC from LWE with Polynomial ModulusSina Shiehian. 481-493 [doi]
- On Sufficient Oracles for Secure Computation with Identifiable AbortMark Simkin 0001, Luisa Siniscalchi, Sophia Yakoubov. 494-515 [doi]
- Prio+: Privacy Preserving Aggregate Statistics via Boolean SharesSurya Addanki, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky, Antigoni Polychroniadou. 516-539 [doi]
- Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHEIlaria Chillotti, Emmanuela Orsini, Peter Scholl, Nigel P. Smart, Barry Van Leeuwen. 540-563 [doi]
- Streaming and Unbalanced PSI from Function Secret SharingSamuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou. 564-587 [doi]
- Black-Box Anonymous Commit-and-ProveAlessandra Scafuro. 591-614 [doi]
- Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge SystemCyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy, Michiel Verbauwhede. 615-638 [doi]
- Inner Product Functional Commitments with Constant-Size Public Parameters and OpeningsHien Chu, Dario Fiore 0001, Dimitris Kolonelos, Dominique Schröder. 639-662 [doi]
- MyOPE: Malicious SecuritY for Oblivious Polynomial EvaluationMalika Izabachène, Anca Nitulescu, Paola de Perthuis, David Pointcheval. 663-686 [doi]
- NIWI and New Notions of Extraction for Algebraic LanguagesChaya Ganesh, Hamidreza Khoshakhlagh, Roberto Parisella. 687-710 [doi]
- Succinct Attribute-Based Signatures for Bounded-Size Circuits by Combining Algebraic and Arithmetic ProofsYusuke Sakai 0001. 711-734 [doi]
- What Makes Fiat-Shamir zkSNARKs (Updatable SRS) Simulation Extractable?Chaya Ganesh, Hamidreza Khoshakhlagh, Markulf Kohlweiss, Anca Nitulescu, Michal Zajac. 735-760 [doi]
- Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving LedgersMatteo Campanelli, Felix Engelmann, Claudio Orlandi. 761-784 [doi]