1 | -- | 3 | Jung Hee Cheon, Kristin E. Lauter, Yongsoo Song. Editor's Preface for the Second Annual MathCrypt Proceedings Volume |
4 | -- | 17 | Jean-François Biasse, Xavier Bonnetain, Benjamin Pring, André Schrottenloher, William Youmans. A trade-off between classical and quantum circuit size for an attack against CSIDH |
18 | -- | 30 | Oleg Taraskin, Vladimir Soukharev, David Jao, Jason T. LeGrow. Towards Isogeny-Based Password-Authenticated Key Establishment |
31 | -- | 44 | Yasushi Takahashi, Momonari Kudo, Ryoya Fukasaku, Yasuhiko Ikematsu, Masaya Yasuda, Kazuhiro Yokoyama. Algebraic approaches for solving isogeny problems of prime power degrees |
45 | -- | 59 | Sean Murphy, Rachel Player. Discretisation and Product Distributions in Ring-LWE |
60 | -- | 71 | Thijs Laarhoven. Approximate Voronoi cells for lattices, revisited |
72 | -- | 86 | Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi. (In)Security of Ring-LWE Under Partial Key Exposure |
87 | -- | 110 | Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi. Towards a Ring Analogue of the Leftover Hash Lemma |
111 | -- | 122 | Marc Joye, Oleksandra Lapiha, Ky Nguyen, David Naccache. The Eleventh Power Residue Symbol |
123 | -- | 130 | Francesco Sica. Factoring with Hints |
131 | -- | 142 | Mehdi Tibouchi, Alexandre Wallet. One Bit is All It Takes: A Devastating Timing Attack on BLISS's Non-Constant Time Sign Flips |
143 | -- | 156 | Jean-François Biasse, Benjamin Pring. A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE |
157 | -- | 173 | László Csirmaz. Secret sharing and duality |
174 | -- | 178 | Antonio J. Di Scala, Carlo Sanna, Edoardo Signorini. On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial |
179 | -- | 196 | Maura B. Paterson, Douglas R. Stinson. On the equivalence of authentication codes and robust (2, 2)-threshold schemes |
197 | -- | 222 | Mikhail Anokhin. Pseudo-free families of computational universal algebras |
223 | -- | 236 | Gary McGuire, Oisín Robinson. Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic |
237 | -- | 249 | Matvei Kotov, Anton Menshov, Alexander Ushakov. Attack on Kayawood protocol: uncloaking private keys |
250 | -- | 257 | Filipe Araújo, Samuel Neves. The circulant hash revisited |
258 | -- | 265 | Yu Zhou, Daoguang Mu, Xinfeng Dong. On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes |
266 | -- | 279 | Atul Pandey, Indivar Gupta, Dhiraj Kumar Singh. Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings |
280 | -- | 283 | Dylan Rudy, Chris Monico. Remarks on a Tropical Key Exchange System |
284 | -- | 297 | Ignacio Cascudo, Reto Schnyder. A note on secure multiparty computation via higher residue symbols |
298 | -- | 304 | Elizabeth M. Reid. Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions |
305 | -- | 344 | Arghya Bhattacharjee, Cuauhtemoc Mancillas-López, Eik List, Mridul Nandi. The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes |
345 | -- | 358 | Fouazou Lontouo Perez Broon, Thinh Dang, Emmanuel Fouotsa, Dustin Moody. Isogenies on twisted Hessian curves |
359 | -- | 407 | Martin Ekerå. Quantum algorithms for computing general discrete logarithms and orders with tradeoffs |
408 | -- | 433 | Margaux Dugardin, Werner Schindler, Sylvain Guilley. Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods |
434 | -- | 453 | Jing Zhang, Yuan Li, John O. Adeyeye. Sensitivities and block sensitivities of elementary symmetric Boolean functions |
454 | -- | 464 | Guanju Xiao, Lixia Luo, Yingpu Deng. Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves |
465 | -- | 482 | Fucai Luo, Saif Al-Kuwari. Revocable attribute-based proxy re-encryption |