Abstract is missing.
- Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient CircuitsYuval Ishai, Mor Weiss, Guang Yang. 3-32 [doi]
- Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPsEli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Madars Virza. 33-64 [doi]
- From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and BackBenny Applebaum, Pavel Raykov. 65-82 [doi]
- A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random OraclesMichele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti. 83-111 [doi]
- Improved OR-Composition of Sigma-ProtocolsMichele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti. 112-141 [doi]
- Onion ORAM: A Constant Bandwidth Blowup Oblivious RAMSrinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs. 145-174 [doi]
- Oblivious Parallel RAM and ApplicationsElette Boyle, Kai-Min Chung, Rafael Pass. 175-204 [doi]
- Oblivious Parallel RAM: Improved Efficiency and Generic ConstructionsBinyi Chen, Huijia Lin, Stefano Tessaro. 205-234 [doi]
- Déjà Q: Encore! Un Petit IBEHoeteck Wee. 237-258 [doi]
- A Study of Pair Encodings: Predicate Encryption in Prime Order GroupsShashank Agrawal, Melissa Chase. 259-288 [doi]
- Optimal Amplification of Noisy LeakagesStefan Dziembowski, Sebastian Faust, Maciej Skórski. 291-318 [doi]
- Rational SumchecksSiyao Guo, Pavel Hubácek, Alon Rosen, Margarita Vald. 319-351 [doi]
- Interactive Coding for Interactive ProofsAllison Bishop, Yevgeniy Dodis. 352-366 [doi]
- Information-Theoretic Local Non-malleable Codes and Their ApplicationsNishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman. 367-392 [doi]
- Optimal Computational Split-state Non-malleable CodesDivesh Aggarwal, Shashank Agrawal, Divya Gupta 0001, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran. 393-417 [doi]
- How to Avoid Obfuscation Using Witness PRFsMark Zhandry. 421-448 [doi]
- Cutting-Edge Cryptography Through the Lens of Secret SharingIlan Komargodski, Mark Zhandry. 449-479 [doi]
- Functional Encryption Without ObfuscationSanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry. 480-511 [doi]
- On Constructing One-Way Permutations from Indistinguishability ObfuscationGilad Asharov, Gil Segev. 512-541 [doi]
- Contention in Cryptoland: Obfuscation, Leakage and UCEMihir Bellare, Igors Stepanovs, Stefano Tessaro. 542-564 [doi]
- Point-Function Obfuscation: A Framework and Generic ConstructionsMihir Bellare, Igors Stepanovs. 565-594 [doi]