Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui and Björn Tackmann

Attestation Waves: Platform Trust via Remote Power Analysis
Ignacio M. Delgado-Lozano, Macarena C. Martínez-Rodríguez, Alexandros Bakas, Billy Brumley and Antonis Michalas

BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Nabil Alkeilani Alkadri, Patrick Harasser and Christian Janson

Countermeasures against Backdoor Attacks towards Malware Detectors
Shintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji and Shinsaku Kiyomoto

Cross-Domain Attribute-Based Access Control Encryption
Mahdi Sedaghat and Bart Preneel

Efficient Threshold-Optimal ECDSA
Michaella Pettit

FO-like Combiners and Hybrid Post-Quantum Cryptography
Loïs Huguenin-Dumittan and Serge Vaudenay

Free By Design: On the Feasibility Of Free-Riding Attacks Against Zero-Rated Services
Julian Fietkau, David Pascal Runge and Jean-Pierre Seifert

Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions
Nolan Miranda, Foo Yee Yeo and Vipin Singh Sehrawat

GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme
Mahmoud Yehia, Riham Altawy and T. Aaron Gulliver

Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier and Hirotaka Yoshida

How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting (short paper)
Tamara Finogina, Javier Herranz and Enrique Larraia

How Distance-bounding can Detect Internet Traffic Hijacking
Ghada Arfaoui, Gildas Avoine, Olivier Gimenez and Jacques Traoré

Issuer-Hiding Attribute-Based Credentials
Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher and Kai Samelin

Linear-time oblivious permutations for SPDZ (short paper)
Peeter Laud

On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem
Anaëlle Le Dévéhat, Hiroki Shizuya and Shingo Hasegawa

Partition Oracles from Weak Key Forgeries
Marcel Armour and Carlos Cid

Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model
Antonio Faonio

Practical Privacy-Preserving Face Identification based on Function-Hiding Functional Encryption (short paper)
Alberto Ibarrondo, Hervé Chabanne and Melek Önen

Report and Trace Ring Signatures
Ashley Fraser and Elizabeth A. Quaglia

Selectively Linkable Group Signatures – Stronger Security and Preserved Verifiability
Ashley Fraser, Lydia Garms and Anja Lehmann

SoK: Secure Memory Allocation
Bojan Novković and Marin Golub

Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs
Behzad Abdolmaleki and Daniel Slamanig

THC: Practical and Cost-Effective Verification of Delegated Computation
Pablo Rauzy and Ali Nehme

The Matrix Reloaded: Multiplication Strategies in FrodoKEM
Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider and Christine van Vredendaal

Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
Karim Baghery and Mahdi Sedaghat

Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training
Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto and Nozomu Togawa

Towards Quantum Large-Scale Password Guessing on Real-World Distributions
Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May and Lars Schlieper