Abstract is missing.
- Improved Differential Cryptanalysis on SPECK Using Plaintext StructuresZhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang 0003, Zhiquan Liu, Ling Song 0001. 3-24 [doi]
- Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly $\mathbb {F}_p$-Based CiphersZeyu Xu, Shiyao Chen, Meiqin Wang, Puwen Wei. 25-52 [doi]
- A New Correlation Cube Attack Based on Division PropertyCheng Che, Tian Tian. 53-71 [doi]
- The Triangle Differential CryptanalysisXiaofeng Xie, Tian Tian. 72-88 [doi]
- Key Recovery Attacks on Grain-Like Keystream Generators with Key InjectionMatthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong. 89-108 [doi]
- Related-Cipher Attacks: Applications to Ballet and ANTYongxia Mao, Wenling Wu, Yafei Zheng, Lei Zhang 0186. 109-123 [doi]
- Cryptanalysis of SPEEDYJinliang Wang, Chao Niu, Qun Liu 0006, Muzhou Li, Bart Preneel, Meiqin Wang. 124-156 [doi]
- Reconsidering Generic Composition: The Modes A10, A11 and A12 are InsecureFrancesco Berti. 157-176 [doi]
- Exploring Formal Methods for Cryptographic Hash Function ImplementationsNicky Mouha. 177-195 [doi]
- A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGMJia-Chng Loh, Fuchun Guo, Willy Susilo, Guomin Yang. 199-219 [doi]
- Compact Password Authenticated Key Exchange from Group ActionsRen Ishibashi, Kazuki Yoneyama. 220-247 [doi]
- Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HEPeiying Xu, Li-Ping Wang. 248-269 [doi]
- Identity-Based Encryption from Lattices Using Approximate TrapdoorsMalika Izabachène, Lucas Prabel, Adeline Roux-Langlois. 270-290 [doi]
- Homomorphic Signatures for Subset and Superset Mixed Predicates and Its ApplicationsMasahito Ishizaka, Kazuhide Fukushima. 291-319 [doi]
- Adaptively Secure Identity-Based Encryption from Middle-Product Learning with ErrorsJingjing Fan, Xingye Lu, Man Ho Au. 320-340 [doi]
- Quantum-Access Security of Hash-Based Signature SchemesQuan Yuan, Mehdi Tibouchi, Masayuki Abe. 343-380 [doi]
- Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle ModelErnest Foo, Qinyi Li. 381-402 [doi]
- Ghidle: Efficient Large-State Block Ciphers for Post-quantum SecurityMotoki Nakahashi, Rentaro Shiba, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Fukang Liu, Takanori Isobe 0001. 403-430 [doi]
- Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric CiphersHuiqin Chen, Yongqiang Li 0001, Parhat Abla, Zhiran Li, Lin Jiao, Mingsheng Wang. 431-451 [doi]
- Memory-Efficient Quantum Information Set Decoding AlgorithmNaoto Kimura, Atsushi Takayasu, Tsuyoshi Takagi. 452-468 [doi]
- CSI-SharK: CSI-FiSh with Sharing-friendly KeysShahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen. 471-502 [doi]
- Practical Verifiable Random Function with RKA SecurityTsz Hon Yuen, Shimin Pan, Sheng Huang, Xiaoting Zhang. 503-522 [doi]
- Statistically Consistent Broadcast Authenticated Encryption with Keyword Search - Adaptive Security from Standard AssumptionsSayantan Mukherjee. 523-552 [doi]
- Modular Design of KEM-Based Authenticated Key ExchangeColin Boyd, Bor de Kock, Lise Millerjord. 553-579 [doi]
- Reusable, Instant and Private Payment Guarantees for CryptocurrenciesAkash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong, Bart Preneel. 580-605 [doi]
- BinAlign: Alignment Padding Based Compiler Provenance RecoveryMaliha Ismail, Yan Lin 0003, DongGyun Han, Debin Gao. 609-629 [doi]
- Encrypted Network Traffic Classification with Higher Order Graph Neural NetworkZulu Okonkwo, Ernest Foo, Zhe Hou, Qinyi Li, Zahra Jadidi. 630-650 [doi]