Algebraically Structured LWE, Revisited.- Lattice Trapdoors and IBE from Middle-Product LWE.- Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation.- Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems.- A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement.- Synchronous Consensus with Optimal Asynchronous Fallback Guarantees.- Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank.- Optimal Bounded-Collusion Secure Functional Encryption.- From FE Combiners to Secure MPC and Back.- (Pseudo) Random Quantum States with Binary Phase.- General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography.- Composable and Finite Computational Security of Quantum Message Transmission.- On Fully Secure MPC with Solitary Output.- Secure Computation with Preprocessing via Function Secret Sharing.- Efficient Private PEZ Protocols for Symmetric Functions.- TheFunction-Inversion Problem: Barriers and Opportunities.- On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations.- Characterizing Collision and Second-Preimage Resistance in Linicrypt.- Efficient Information-Theoretic Secure Multiparty Computation over Z/pkZ via Galois Rings.- Is Information-Theoretic Topology-Hiding Computation Possible.- Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation.- On Perfectly Secure 2PC in the OT-Hybrid Model.