https://cic.iacr.org/i/2/1
Boomy: Batch Opening Of Multivariate polYnomial commitment https://cic.iacr.org/p/2/1/7 Thomas Lavaur, Jérôme Lacan
Goldreich-Krawczyk Revisited: A Note on the Zero Knowledge of Proofs of Knowledge https://cic.iacr.org/p/2/1/14 Lior Rotem
A divide-and-conquer sumcheck protocol https://cic.iacr.org/p/2/1/15 Christophe Levrat, Tanguy Medevielle, Jade Nardi
Bulletproofs for R1CS: Bridging the Completeness-Soundness Gap and a ZK Extension https://cic.iacr.org/p/2/1/16 Gil Segev
Beyond the Circuit How to minimize foreign arithmetic in ZKP circuits https://cic.iacr.org/p/2/1/23 Michele Orrù, George Kadianakis, Mary Maller, Greg Zaverucha
Hash-Based Multi-Signatures for Post-Quantum Ethereum https://cic.iacr.org/p/2/1/13 Justin Drake, Dmitry Khovratovich, Mikhail Kudinov, Benedikt Wagner
Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures https://cic.iacr.org/p/2/1/8 Jonathan Katz, Antoine Urban
The many faces of Schnorr: a toolkit for the modular design of threshold Schnorr signatures https://cic.iacr.org/p/2/1/18 Victor Shoup
SoK: Privacy-Preserving Signatures https://cic.iacr.org/p/2/1/10 Alishah Chator, Matthew Green, Pratyush Ranjan Tiwari
Breaking BASS https://cic.iacr.org/p/2/1/35 Simon-Philipp Merz, Kenneth G. Paterson, Àlex Rodríguez García
Fully Composable Homomorphic Encryption https://cic.iacr.org/p/2/1/1 Daniele Micciancio
A Greedy Global Framework for Lattice Reduction Using Deep Insertions https://cic.iacr.org/p/2/1/2 Sanjay Bhattacherjee, Julio Hernandez-Castro, Jack Moyler
The Round Complexity of Proofs in the Bounded Quantum Storage Model https://cic.iacr.org/p/2/1/3 Alex B. Grilo, Philippe Lamontagne
Unconditional Quantum Cryptography with a Bounded Number of Keys https://cic.iacr.org/p/2/1/5 Vipul Goyal, Giulio Malavolta, Bhaskar Roberts
The supersingular endomorphism ring problem given one endomorphism https://cic.iacr.org/p/2/1/6 Arthur Herlédan Le Merdy, Benjamin Wesolowski
On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption https://cic.iacr.org/p/2/1/9 Kamil Kluczniak, Giacomo Santato
Faster Quantum Algorithms for MQ2 and Applications https://cic.iacr.org/p/2/1/17 Quentin Edme, Pierre-Alain Fouque, André Schrottenloher
Relations Among New CCA Security Notions for Approximate FHE https://cic.iacr.org/p/2/1/20 Chris Brzuska, Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, Renaud Sirdey
Designs for practical SHE schemes based on Ring-LWR https://cic.iacr.org/p/2/1/21 Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player, Miruna Rosca, Radu Titiu
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security https://cic.iacr.org/p/2/1/22 Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, Saraswathy RV
Quantum Analysis of AES https://cic.iacr.org/p/2/1/25 Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay
Fast Plaintext-Ciphertext Matrix Multiplication from Additively Homomorphic Encryption https://cic.iacr.org/p/2/1/26 Krishna Sai Tarun Ramapragada, Utsav Banerjee
A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography https://cic.iacr.org/p/2/1/33 Martin Ekerå, Joel Gärtner
Efficient Methods for Simultaneous Homomorphic Inversion https://cic.iacr.org/p/2/1/36 Jean Belo Klamti, M. Anwarul Hasan, Koray Karabina
Further Improvements in AES Execution over TFHE https://cic.iacr.org/p/2/1/39 Sonia Belaïd, Nicolas Bon, Aymen Boudguiga, Renaud Sirdey, Daphné Trama, Nicolas Ye