Abstract is missing.
- Construction of Recursive MDS Matrices Using DLS MatricesKishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta. 3-27 [doi]
- FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion MatrixKishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta. 28-52 [doi]
- A Small GIFT-COFB: Lightweight Bit-Serial ArchitecturesAndrea Caforio, Daniel Collins, Subhadeep Banik, Francesco Regazzoni 0001. 53-77 [doi]
- Identity-Based Encryption in DDH Hard GroupsOlivier Blazy, Saqib A. Kakvi. 81-102 [doi]
- TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality NetworksMarloes Venema, Greg Alpár. 103-129 [doi]
- Cryptanalysis of Reduced Round SPEEDYRaghvendra Rohit 0001, Santanu Sarkar 0001. 133-149 [doi]
- And Rijndael?: Automatic Related-Key Differential Analysis of RijndaelLoïc Rouquette, David Gérault, Marine Minier, Christine Solnon. 150-175 [doi]
- Breaking PantherChristina Boura, Rachelle Heim Boissier, Yann Rotella. 176-188 [doi]
- Automated Key Recovery Attacks on Round-Reduced OrthrosMuzhou Li, Ling Sun 0001, Meiqin Wang. 189-213 [doi]
- Dilithium for Memory Constrained DevicesJoppe W. Bos, Joost Renes, Amber Sprenkels. 217-235 [doi]
- Lattice-Based Inner Product ArgumentVeronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma 0006. 236-268 [doi]
- Streaming SPHINCS+ for Embedded Devices Using the Example of TPMsRuben Niederhagen, Johannes Roth, Julian Wälde. 269-291 [doi]
- Solving the Learning Parity with Noise Problem Using Quantum AlgorithmsBénédikt Tran, Serge Vaudenay. 295-322 [doi]
- An Estimator for the Hardness of the MQ ProblemEmanuele Bellini 0002, Rusydi H. Makarim, Carlo Sanna, Javier A. Verbel. 323-347 [doi]
- Recovering Rainbow's Secret Key with a First-Order Fault AttackThomas Aulbach, Tobias Kovats, Juliane Krämer, Soundes Marzougui. 348-368 [doi]
- TransNet: Shift Invariant Transformer Network for Side Channel AnalysisSuvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay. 371-396 [doi]
- To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCAAzade Rezaeezade, Guilherme Perin, Stjepan Picek. 397-421 [doi]
- A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic EncryptionMónica P. Arenas, Muhammed Ali Bingöl, Hüseyin Demirci, Georgios Fotiadis, Gabriele Lenzini. 425-447 [doi]
- Card-Minimal Protocols for Three-Input Functions with Standard Playing CardsRikuo Haga, Yu-ichi Hayashi, Daiki Miyahara, Takaaki Mizuki. 448-468 [doi]
- A Random Oracle for All of UsMarc Fischlin, Felix Rohrbach, Tobias Schmalz. 469-489 [doi]
- DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via TraitsVladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sýs, Vashek Matyas. 493-517 [doi]
- Co-factor Clearing and Subgroup Membership Testing on Pairing-Friendly CurvesYoussef El Housni, Aurore Guillevic, Thomas Piellard. 518-536 [doi]
- A Generalized Attack on the Multi-prime Power RSAAbderrahmane Nitaj, Willy Susilo, Joseph Tonien. 537-549 [doi]
- Finding Low-Weight Polynomial Multiples Using the Rho MethodLaila El Aimani. 550-575 [doi]
- EHNP Strikes Back: Analyzing SM2 ImplementationsJinzheng Cao, Qingfeng Cheng, Jian Weng 0001. 576-600 [doi]