Abstract is missing.
- Algebraically Structured LWE, RevisitedChris Peikert, Zachary Pepin. 1-23 [doi]
- Lattice Trapdoors and IBE from Middle-Product LWEAlex Lombardi, Vinod Vaikuntanathan, Thuy Duong Vuong. 24-54 [doi]
- Matrix PRFs: Constructions, Attacks, and Applications to ObfuscationYilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee. 55-80 [doi]
- Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product ProblemsSteven D. Galbraith, Lukas Zobernig. 81-110 [doi]
- A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key AgreementDaniele Friolo, Daniel Masny, Daniele Venturi 0001. 111-130 [doi]
- Synchronous Consensus with Optimal Asynchronous Fallback GuaranteesErica Blum, Jonathan Katz, Julian Loss. 131-150 [doi]
- Predicate Encryption from Bilinear Maps and One-Sided Probabilistic RankJosh Alman, Robin Hui. 151-173 [doi]
- Optimal Bounded-Collusion Secure Functional EncryptionPrabhanjan Ananth, Vinod Vaikuntanathan. 174-198 [doi]
- From FE Combiners to Secure MPC and BackPrabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai. 199-228 [doi]
- (Pseudo) Random Quantum States with Binary PhaseZvika Brakerski, Omri Shmueli. 229-250 [doi]
- General Linear Group Action on Tensors: A Candidate for Post-quantum CryptographyZhengfeng Ji, Youming Qiao, Fang Song 0001, Aaram Yun. 251-281 [doi]
- Composable and Finite Computational Security of Quantum Message TransmissionFabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu. 282-311 [doi]
- On Fully Secure MPC with Solitary OutputShai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin. 312-340 [doi]
- Secure Computation with Preprocessing via Function Secret SharingElette Boyle, Niv Gilboa, Yuval Ishai. 341-371 [doi]
- Efficient Private PEZ Protocols for Symmetric FunctionsYoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta. 372-392 [doi]
- The Function-Inversion Problem: Barriers and OpportunitiesHenry Corrigan-Gibbs, Dmitry Kogan. 393-421 [doi]
- On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box SeparationsNir Bitansky, Akshay Degwekar. 422-450 [doi]
- Characterizing Collision and Second-Preimage Resistance in LinicryptIan McQuoid, Trevor Swope, Mike Rosulek. 451-470 [doi]
- kZ via Galois RingsMark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero 0001, Chen Yuan. 471-501 [doi]
- Is Information-Theoretic Topology-Hiding Computation Possible?Marshall Ball, Elette Boyle, Ran Cohen, Tal Malkin, Tal Moran. 502-530 [doi]
- Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private ComputationIftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak. 531-560 [doi]
- On Perfectly Secure 2PC in the OT-Hybrid ModelBar Alon, Anat Paskin-Cherniavsky. 561-595 [doi]