Abstract is missing.
- Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256Jian Guo, Ling Song, Haoyang Wang 0010. 3-23 [doi]
- Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AESLorenzo Grassi 0001, Christian Rechberger. 24-45 [doi]
- PNB-Focused Differential Cryptanalysis of ChaCha Stream CipherShotaro Miyashita, Ryoma Ito 0001, Atsuko Miyaji. 46-66 [doi]
- Improved Differential Attack on Round-Reduced LEAYuhan Zhang, Wenling Wu, Lei Zhang. 67-84 [doi]
- Implementing Grover Oracle for Lightweight Block Ciphers Under Depth ConstraintsSubodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya. 85-105 [doi]
- Improved Division Property for Ciphers with Complex Linear LayersYongxia Mao, Wenling Wu, Bolin Wang, Li Zhang. 106-124 [doi]
- Fast Skinny-128 SIMD Implementations for Sequential Modes of OperationAlexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri. 125-144 [doi]
- Handle the Traces: Revisiting the Attack on ECDSA with EHNPJinzheng Cao, Yanbin Pan, Qingfeng Cheng, Xinghua Li 0001. 147-167 [doi]
- Hybrid Dual and Meet-LWE AttackLei Bi 0002, Xianhui Lu, Junjie Luo 0001, Kunpeng Wang. 168-188 [doi]
- Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018Wenshuo Guo, Fangwei Fu. 189-205 [doi]
- Chosen Ciphertext Secure Keyed Two-Level Homomorphic EncryptionYusaku Maeda, Koji Nuida. 209-228 [doi]
- Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for SubspaceYumei Li 0003, Mingwu Zhang, Futai Zhang. 229-243 [doi]
- TIDE: A Novel Approach to Constructing Timed-Release EncryptionAngelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia. 244-264 [doi]
- Multi-signatures for ECDSA and Its Applications in BlockchainShimin Pan, Kwan Yin Chan, Handong Cui, Tsz Hon Yuen. 265-285 [doi]
- Fiat-Shamir Signatures Based on Module-NTRUShi Bai, Austin Beard, Floyd Johnson, Sulani K. B. Vidhanalage, Tran Ngo. 289-308 [doi]
- Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny Using Precedence-Constrained SchedulingKittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan. 309-331 [doi]
- An Injectivity Analysis of Crystals-Kyber and Implications on Quantum SecurityXiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld. 332-351 [doi]
- Verifiable Decryption in the HeadKristian Gjøsteen, Thomas Haines, Johannes Müller 0001, Peter B. Rønne, Tjerand Silde. 355-374 [doi]
- Resumable Zero-Knowledge for Circuits from Symmetric Key PrimitivesHandong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu. 375-398 [doi]
- On Security of Fuzzy Commitment Scheme for Biometric AuthenticationDonghoon Chang, Surabhi Garg, Munawar Hasan, Sweta Mishra. 399-419 [doi]
- SoK: Decentralized Randomness Beacon ProtocolsMayank Raikwar, Danilo Gligoroski. 420-446 [doi]
- CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart ContractsXiaofei Wu, Hao Wang 0007, Chunpeng Ge, Lu Zhou, Qiong Huang, Lanju Kong, LiZhen Cui, Zhe Liu. 449-468 [doi]
- DeChain: A Blockchain Framework Enhancing Decentralization via ShardingShenwei Chen, Zhen Liu, Yu Long, Dawu Gu. 469-488 [doi]
- Garrison: A Novel Watchtower Scheme for BitcoinArash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld. 489-508 [doi]
- Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network AnalyticsChen Zhao, Jianing Ding, Zhenzhen Li, Zhen Li 0011, Gang Xiong 0001, Gaopeng Gou. 509-528 [doi]