The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows:
Part I: Secure Multi-party computation; threshold cryptography; .
Part II: proof systems - succinctness and foundations; anonymity;
Part III: quantum cryptanalysis; symmetric-key cryptanalysis;
Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model;
Part V: functional encryption, commitments and proofs; secure messaging and broadcast;
Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models;
Part VII: post-quantum cryptography;
Part VIII: quantum cryptography; key exchange; symmetric-key design.