Abstract is missing.
- A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise GrowthYavuz Akin, Jakub Klemsa, Melek Önen. 3-23 [doi]
- Deniable Cryptosystems: Simpler Constructions and Achieving Leakage ResilienceZhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang. 24-44 [doi]
- Threshold Fully Homomorphic Encryption Over the TorusYukimasa Sugizaki, Hikaru Tsuchida, Takuya Hayashi, Koji Nuida, Akira Nakashima, Toshiyuki Isshiki, Kengo Mori. 45-65 [doi]
- Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis DelegationQi Wang, Haodong Huang, Juyan Li, Qi Yuan. 66-85 [doi]
- Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPCAysajan Abidin, Erik Pohle, Bart Preneel. 86-105 [doi]
- Code-Based Secret Handshake Scheme, RevisitedMinkyu Kim, Hyung Tae Lee. 106-125 [doi]
- Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed LeakageFeng Li 0041, Jianfeng Ma 0001, Yinbin Miao, Pengfei Wu, Xiangfu Song. 126-146 [doi]
- Password-Based Credentials with Security Against Server CompromiseDennis Dayanikli, Anja Lehmann. 147-167 [doi]
- Making an Asymmetric PAKE Quantum-Annoying by Hiding Group ElementsMarcel Tiepelt, Edward Eaton, Douglas Stebila. 168-188 [doi]
- Commitments with Efficient Zero-Knowledge Arguments from Subset Sum ProblemsJules Maire, Damien Vergnaud. 189-208 [doi]
- Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-AllocationsCarmen Wabartha, Julian Liedtke, Nicolas Huber, Daniel Rausch 0001, Ralf Küsters. 209-228 [doi]
- An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and ImplementationRavi Anand, Subhadeep Banik, Andrea Caforio, Kazuhide Fukushima, Takanori Isobe 0001, Shinsaku Kiyomoto, Fukang Liu, Yuto Nakano, Kosei Sakamoto, Nobuyuki Takeuchi. 229-248 [doi]
- Secure Outsourced Matrix Multiplication with Fully Homomorphic EncryptionLin Zhu, Qiang-Sheng Hua, Yi Chen, Hai Jin 0001. 249-269 [doi]
- Sequential Half-Aggregation of Lattice-Based SignaturesKatharina Boudgoust, Akira Takahashi 0002. 270-289 [doi]
- Oblivious Extractors and Improved Security in Biometric-Based Authentication SystemsIvan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian. 290-312 [doi]
- Optimally-Fair Multi-party Exchange Without Trusted PartiesIvo Maffei, A. W. Roscoe 0001. 313-333 [doi]
- Cheap and Fast Iterative Matrix Inverse in Encrypted DomainTae Min Ahn, Kang Hoon Lee, Joon Soo Yoo, Ji Won Yoon. 334-352 [doi]
- Practical Randomized Lattice Gadget Decomposition with Application to FHESohyun Jeon, Hyang-Sook Lee, Jeongeun Park 0001. 353-371 [doi]
- Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWEThéophile Brézot, Paola de Perthuis, David Pointcheval. 372-392 [doi]
- Committed Private Information RetrievalQuang Cao, Hong-Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng 0001, Yu-Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah. 393-413 [doi]
- Two-Message Authenticated Key Exchange from Public-Key EncryptionYou Lyu, Shengli Liu 0001. 414-434 [doi]
- Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the HeadJules Maire, Damien Vergnaud. 435-454 [doi]
- Scaling Mobile Private Contact Discovery to Billions of UsersLaura Hetz, Thomas Schneider 0003, Christian Weinert. 455-476 [doi]