Abstract is missing.
- Automated Issuance of Post-Quantum Certificates: A New ChallengeAlexandre Augusto Giron, Frederico Schardong, Lucas Pandolfo Perin, Ricardo Custódio, Victor Valle, Víctor Mateu. 3-23 [doi]
- Algorithmic Views of Vectorized Polynomial Multipliers - NTRU PrimeVincent Hwang, Chi-Ting Liu, Bo-Yin Yang. 24-46 [doi]
- Efficient Quantum-Safe Distributed PRF and Applications: Playing DiSE in a Quantum WorldSayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay. 47-78 [doi]
- On the Untapped Potential of the Quantum FLT-Based InversionRen Taguchi, Atsushi Takayasu. 79-100 [doi]
- Breaking DPA-Protected Kyber via the Pair-Pointwise MultiplicationEstuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Lukasz Chmielewski, Kirthivaasan Puniamurthy, Milan Sorf. 101-130 [doi]
- The Key Lattice Framework for Concurrent Group MessagingKelong Cong, Karim Eldefrawy, Nigel P. Smart, Ben Terner. 133-162 [doi]
- Identity-Based Matchmaking Encryption from Standard Lattice AssumptionsRoberta Cimorelli Belfiore, Andrea De Cosmo, Anna Lisa Ferrara. 163-188 [doi]
- Decentralized Private Stream Aggregation from LatticesUddipana Dowerah, Aikaterini Mitrokotsa. 189-214 [doi]
- A Security Analysis of WPA3-PK: Implementation and Precomputation AttacksMathy Vanhoef, Jeroen Robben. 217-240 [doi]
- When and How to Aggregate Message Authentication Codes on Lossy Channels?Eric Wagner 0003, Martin Serror, Klaus Wehrle, Martin Henze. 241-264 [doi]
- DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite NetworksTianbo Lu, Xia Ding, Jiaze Shang, Pengfei Zhao, Han Zhang. 265-282 [doi]
- DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability MiningXi Ling, Jiongchi Yu, Ziming Zhao, Zhihao Zhou, Haitao Xu, Binbin Chen, Fan Zhang. 283-309 [doi]
- Memory Efficient Privacy-Preserving Machine Learning Based on Homomorphic EncryptionRobert Podschwadt, Parsa Ghazvinian, Mohammad GhasemiGol, Daniel Takabi. 313-339 [doi]
- SNARKProbe: An Automated Security Analysis Framework for zkSNARK ImplementationsYongming Fan, Yuquan Xu, Christina Garman. 340-372 [doi]
- Privacy-Preserving Verifiable CNNsNuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Yoshihiro Koseki, Takahiro Matsuda 0002, Yutaro Nishida, Yusuke Sakai 0001, Jacob C. N. Schuldt, Satoshi Yasuda. 373-402 [doi]
- A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-AggregationHyesun Kwak, Dongwon Lee, Yongsoo Song, Sameer Wagh. 403-430 [doi]
- Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom FunctionElena Andreeva 0001, Benoît Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy 0005. 433-459 [doi]
- Generalized Initialization of the Duplex ConstructionChristoph Dobraunig, Bart Mennink. 460-484 [doi]
- Alternative Key Schedules for the AESChristina Boura, Patrick Derbez, Margot Funk. 485-506 [doi]