Abstract is missing.
- Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest MajoritiesKarim Eldefrawy, Tancrède Lepoint, Antonin Leroux. 3-23 [doi]
- Random Walks and Concurrent Zero-KnowledgeAnand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey. 24-44 [doi]
- Secure and Efficient Delegation of Elliptic-Curve PairingGiovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain. 45-66 [doi]
- Tweaking Key-Alternating Feistel Block CiphersHailun Yan, Lei Wang, Yaobin Shen, Xuejia Lai. 69-88 [doi]
- Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF ModeShoichi Hirose, Yu Sasaki, Hirotaka Yoshida. 89-109 [doi]
- Efficient AGCD-Based Homomorphic Encryption for Matrix and Vector ArithmeticHilder Vitor Lima Pereira. 110-129 [doi]
- Trapdoor Delegation and HIBE from Middle-Product LWE in Standard ModelHuy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk. 130-149 [doi]
- Rotational Cryptanalysis on MAC Algorithm ChaskeyLiliya Kraleva, Tomer Ashur, Vincent Rijmen. 153-168 [doi]
- How Not to Create an Isogeny-Based PAKEReza Azarderakhsh, David Jao, Brian Koziel, Jason T. LeGrow, Vladimir Soukharev, Oleg Taraskin. 169-186 [doi]
- ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files?Rintaro Fujita, Takanori Isobe 0001, Kazuhiko Minematsu. 187-207 [doi]
- Classical Misuse Attacks on NIST Round 2 PQC - The Power of Rank-Based SchemesLoïs Huguenin-Dumittan, Serge Vaudenay. 208-227 [doi]
- Offline Witness Encryption with Semi-adaptive SecurityPeter Chvojka, Tibor Jager, Saqib A. Kakvi. 231-250 [doi]
- Efficient Anonymous Multi-group Broadcast EncryptionIntae Kim, Seong Oun Hwang, Willy Susilo, Joonsang Baek, Jongkil Kim. 251-270 [doi]
- Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key EncryptionAntonio Faonio, Dario Fiore. 271-291 [doi]
- New Methods and Abstractions for RSA-Based Forward Secure SignaturesSusan Hohenberger, Brent Waters. 292-312 [doi]
- Minting Mechanism for Proof of Stake BlockchainsDominic Deuber, Nico Döttling, Bernardo Magri, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan. 315-334 [doi]
- Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas. 335-354 [doi]
- An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building BlocksKeitaro Hiwatashi, Satsuya Ohata, Koji Nuida. 357-376 [doi]
- Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest MajorityMarina Blanton, Ah Reum Kang, Chen Yuan 0002. 377-397 [doi]
- A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the RationalsNiek J. Bouman, Niels de Vreede. 398-417 [doi]
- Saber on ESP32Bin Wang, Xiaozhuo Gu, Yingshan Yang. 421-440 [doi]
- The Lattice-Based Digital Signature Scheme qTESLAErdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa, Jefferson E. Ricardini. 441-460 [doi]
- Secure Two-Party Computation in a Quantum WorldNiklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser 0001, Juliane Krämer, Deevashwer Rathee, Thomas Schneider 0003, Patrick Struck. 461-480 [doi]
- Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound VectorsAaron Hutchinson, Jason T. LeGrow, Brian Koziel, Reza Azarderakhsh. 481-501 [doi]