Abstract is missing.
- On ELFs, Deterministic Encryption, and Correlated-Input SecurityMark Zhandry. 3-32 [doi]
- New Techniques for Efficient Trapdoor Functions and ApplicationsSanjam Garg, Romain Gay, Mohammad Hajiabadi. 33-63 [doi]
- Symbolic Encryption with Pseudorandom KeysDaniele Micciancio. 64-93 [doi]
- Covert Security with Public Verifiability: Faster, Leaner, and SimplerCheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-Jie Lu, Xiao Wang 0012. 97-121 [doi]
- Efficient Circuit-Based PSI with Linear CommunicationBenny Pinkas, Thomas Schneider 0003, Oleksandr Tkachenko, Avishay Yanai. 122-153 [doi]
- An Algebraic Approach to Maliciously Secure Private Set IntersectionSatrajit Ghosh, Tobias Nilges. 154-185 [doi]
- On Finding Quantum Multi-collisionsQipeng Liu, Mark Zhandry. 189-218 [doi]
- On Quantum Advantage in Information Theoretic Single-Server PIRDorit Aharonov, Zvika Brakerski, Kai-Min Chung, Ayal Green, Ching-Yi Lai, Or Sattath. 219-246 [doi]
- Verifier-on-a-Leash: New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear ResourcesAndrea Coladangelo, Alex Bredariol Grilo, Stacey Jeffery, Thomas Vidick. 247-277 [doi]
- Ring Signatures: Logarithmic-Size, No Setup - from Standard AssumptionsMichael Backes 0001, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider. 281-311 [doi]
- Group Signatures Without NIZK: From Lattices in the Standard ModelShuichi Katsumata, Shota Yamada 0001. 312-344 [doi]
- A Modular Treatment of Blind Signatures from Identification SchemesEduard Hauck, Eike Kiltz, Julian Loss. 345-375 [doi]
- Efficient Verifiable Delay FunctionsBenjamin Wesolowski. 379-407 [doi]
- Quantum Lightning Never Strikes the Same State TwiceMark Zhandry. 408-438 [doi]
- Secret-Sharing Schemes for General and Uniform Access StructuresBenny Applebaum, Amos Beimel, Oriol Farràs, Oded Nir, Naty Peter. 441-471 [doi]
- Towards Optimal Robust Secret Sharing with Security Against a Rushing AdversarySerge Fehr, Chen Yuan. 472-499 [doi]
- Simple Schemes in the Bounded Storage ModelJiaxin Guan, Mark Zhandary. 500-524 [doi]
- From Collisions to Chosen-Prefix Collisions Application to Full SHA-1Gaëtan Leurent, Thomas Peyrin. 527-555 [doi]
- Preimage Attacks on Round-Reduced Keccak-224/256 via an Allocating ApproachTing Li, Yao Sun. 556-584 [doi]
- bison Instantiating the Whitened Swap-Or-Not ConstructionAnne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer. 585-616 [doi]
- Worst-Case Hardness for LPN and Cryptographic Hashing via Code SmoothingZvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs. 619-635 [doi]
- New Techniques for Obfuscating ConjunctionsJames Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry. 636-666 [doi]
- Distributional Collision Resistance Beyond One-Way FunctionsNir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev. 667-695 [doi]
- Multi-target Attacks on the Picnic Signature Scheme and Related ProtocolsItai Dinur, Niv Nadler. 699-727 [doi]
- Durandal: A Rank Metric Based Signature SchemeNicolas Aragon, Olivier Blazy, Philippe Gaborit, Adrien Hauteville, Gilles Zémor. 728-758 [doi]
- SeaSign: Compact Isogeny Signatures from Class Group ActionsLuca De Feo, Steven D. Galbraith. 759-789 [doi]