Abstract is missing.
- The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour CipherFangzhou Liu, Xueqi Zhu, Ruozhou Xu, Danping Shi, Peng Wang 0009. 3-19 [doi]
- c] Based on Correlation MatricesXiaomeng Sun, Wenying Zhang, René Rodríguez, Huimin Liu. 20-40 [doi]
- On the Security Bounds for Block Ciphers Without Whitening Key Addition Against Integral DistinguishersFanyang Zeng, Tian Tian. 41-56 [doi]
- Tight Multi-user Security of Ascon and Its Large Key ExtensionBishwajit Chakraborty 0002, Chandranan Dhar, Mridul Nandi. 57-76 [doi]
- Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2Rikuto Kurahara, Kosei Sakamoto, Yuto Nakano, Takanori Isobe 0001. 77-97 [doi]
- Efficient Search for Optimal Permutations of Refined Type-II Generalized Feistel StructuresXiaodan Li, Wenling Wu, Yuhan Zhang, Ee Duan. 98-117 [doi]
- F-FHEW: High-Precision Approximate Homomorphic Encryption with Batch BootstrappingMan Chen, Yuyue Chen, Rui Zong, Zengpeng Li, Zoe L. Jiang. 121-140 [doi]
- NTRU-Based FHE for Larger Key and Message SpaceRobin Jadoul, Axel Mertens, Jeongeun Park 0001, Hilder V. L. Pereira. 141-160 [doi]
- An Efficient Integer-Wise ReLU on TFHEYi Huang, Junping Wan, Zoe L. Jiang, Jun Zhou 0018, Junbin Fang, Zhenfu Cao. 161-179 [doi]
- đisplaystyle sfHERatio: Homomorphic Encryption of Rationals Using Laurent PolynomialsLuke Harmon, Gaetan Delavignette, Hanes Oliveira. 180-195 [doi]
- TFHE Bootstrapping: Faster, Smaller and Time-Space Trade-OffsRuida Wang, Benqiang Wei, Zhihao Li, Xianhui Lu, Kunpeng Wang. 196-216 [doi]
- Approximate Methods for the Computation of Step Functions in Homomorphic EncryptionTairong Huang, Shihe Ma, Anyu Wang 0001, Xiaoyun Wang 0001. 217-237 [doi]
- Key Cooperative Attribute-Based EncryptionLuqi Huang, Willy Susilo, Guomin Yang, Fuchun Guo. 241-260 [doi]
- On the Feasibility of Identity-Based Encryption with Equality Test Against Insider AttacksKeita Emura. 261-280 [doi]
- Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward PrivacyZhilong Luo, Shifeng Sun 0001, Zhedong Wang, Dawu Gu. 281-302 [doi]
- On the Implications from Updatable Encryption to Public-Key Cryptographic PrimitivesYuichi Tanishita, Ryuya Hayashi, Ryu Ishii, Takahiro Matsuda 0002, Kanta Matsuura. 303-323 [doi]
- Continuous Version of Non-malleable Codes from Authenticated EncryptionAnit Kumar Ghosal, Dipanwita Roychowdhury. 324-344 [doi]
- Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGMJia-Chng Loh, Fuchun Guo, Willy Susilo. 347-367 [doi]
- Threshold Ring Signatures with AccountabilityThanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto. 368-388 [doi]
- Threshold Signatures with Private Accountability via Secretly Designated WitnessesMeng Li 0006, Hanni Ding, Qing Wang, Zijian Zhang 0001, Mauro Conti. 389-407 [doi]
- A Novel Window τNAF on Koblitz CurvesXiuxiu Li, Wei Yu 0008, Kunpeng Wang. 411-428 [doi]
- Parallel Algorithms on Hyperelliptic Pairings Using Hyperelliptic NetsChao Chen, Fangguo Zhang. 429-449 [doi]
- AlgSAT - A SAT Method for Verification of Differential Trails from an Algebraic PerspectiveHuina Li, Haochen Zhang, Kai Hu, Guozhen Liu, Weidong Qiu. 450-471 [doi]
- Hadamard Product Argument from Lagrange-Based Univariate PolynomialsJie Xie, Yuncong Hu, Yu Yu. 472-492 [doi]