Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui and Björn Tackmann
[presentation]

Attestation Waves: Platform Trust via Remote Power Analysis
Ignacio M. Delgado-Lozano, Macarena C. Martínez-Rodríguez, Alexandros Bakas, Billy Brumley and Antonis Michalas
[presentation]

BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Nabil Alkeilani Alkadri, Patrick Harasser and Christian Janson
[presentation]

Countermeasures against Backdoor Attacks towards Malware Detectors
Shintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji and Shinsaku Kiyomoto
[presentation]

Cross-Domain Attribute-Based Access Control Encryption
Mahdi Sedaghat and Bart Preneel
[presentation]

Efficient Threshold-Optimal ECDSA
Michaella Pettit
[presentation]

FO-like Combiners and Hybrid Post-Quantum Cryptography
Loïs Huguenin-Dumittan and Serge Vaudenay
[presentation]

Free By Design: On the Feasibility Of Free-Riding Attacks Against Zero-Rated Services
Julian Fietkau, David Pascal Runge and Jean-Pierre Seifert
[presentation]

Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions
Nolan Miranda, Foo Yee Yeo and Vipin Singh Sehrawat
[presentation]

GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme
Mahmoud Yehia, Riham Altawy and T. Aaron Gulliver
[presentation]

Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier and Hirotaka Yoshida
[presentation]

How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting (short paper)
Tamara Finogina, Javier Herranz and Enrique Larraia
[presentation]

How Distance-bounding can Detect Internet Traffic Hijacking
Ghada Arfaoui, Gildas Avoine, Olivier Gimenez and Jacques Traoré
[presentation]

Issuer-Hiding Attribute-Based Credentials
Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher and Kai Samelin
[presentation]

Linear-time oblivious permutations for SPDZ (short paper)
Peeter Laud
[presentation]

On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem
Anaëlle Le Dévéhat, Hiroki Shizuya and Shingo Hasegawa
[presentation]

Partition Oracles from Weak Key Forgeries
Marcel Armour and Carlos Cid
[presentation]

Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model
Antonio Faonio
[presentation]

Practical Privacy-Preserving Face Identification based on Function-Hiding Functional Encryption (short paper)
Alberto Ibarrondo, Hervé Chabanne and Melek Önen
[presentation]

Report and Trace Ring Signatures
Ashley Fraser and Elizabeth A. Quaglia
[presentation]

Selectively Linkable Group Signatures – Stronger Security and Preserved Verifiability
Ashley Fraser, Lydia Garms and Anja Lehmann
[presentation]

SoK: Secure Memory Allocation
Bojan Novković and Marin Golub
[presentation]

Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs
Behzad Abdolmaleki and Daniel Slamanig
[presentation]

THC: Practical and Cost-Effective Verification of Delegated Computation
Pablo Rauzy and Ali Nehme
[presentation]

The Matrix Reloaded: Multiplication Strategies in FrodoKEM
Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider and Christine van Vredendaal
[presentation]

Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
Karim Baghery and Mahdi Sedaghat
[presentation]

Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training
Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto and Nozomu Togawa
[presentation]

Towards Quantum Large-Scale Password Guessing on Real-World Distributions
Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May and Lars Schlieper
[presentation]