https://cic.iacr.org/i/1/2
Nibesh Shrestha, Adithya Bhat, Aniket Kate, and Kartik Nayak, "Synchronous Distributed Key Generation without Broadcasts," IACR Communications in Cryptology, vol. 1, no. 2, Jul 08, 2024, doi: 10.62056/ayfhsgvtw.
Vincent Hwang, "A Survey of Polynomial Multiplications for Lattice-Based Cryptosystems," IACR Communications in Cryptology, vol. 1, no. 2, Jul 08, 2024, doi: 10.62056/a0ivr-10k.
Gil Segev and Liat Shapira, "An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures," IACR Communications in Cryptology, vol. 1, no. 2, Jul 08, 2024, doi: 10.62056/a6qj89n4e.
Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Şahin, and Muhammed Said Gündoğan, "Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?," IACR Communications in Cryptology, vol. 1, no. 2, Jul 08, 2024, doi: 10.62056/an59qgxq.
Nouri Alnahawi, Johannes Müller, Jan Oupický, and Alexander Wiesmaier, "A Comprehensive Survey on Post-Quantum TLS," IACR Communications in Cryptology, vol. 1, no. 2, Jul 08, 2024, doi: 10.62056/ahee0iuc.
Sean Murphy and Rachel Player, "A Central Limit Approach for Ring-LWE Noise Analysis," IACR Communications in Cryptology, vol. 1, no. 2, Jul 08, 2024, doi: 10.62056/ay76c0kr.
Yi-Hsiu Chen and Yehuda Lindell, "Optimizing and Implementing Fischlin's Transform for UC-Secure Zero Knowledge," IACR Communications in Cryptology, vol. 1, no. 2, Jul 08, 2024, doi: 10.62056/a66chey6b.