Abstract is missing.
- MinRank in the Head - Short Signatures from Zero-Knowledge ProofsGora Adj, Luis Rivera-Zamarripa, Javier A. Verbel. 3-27 [doi]
- Take Your MEDS: Digital Signatures from Matrix Code EquivalenceTung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska. 28-52 [doi]
- n)-IsogeniesThomas Decru, Sabrina Kunzweiler. 53-78 [doi]
- On the Post-quantum Security of Classical Authenticated Encryption SchemesNathalie Lang, Stefan Lucks. 79-104 [doi]
- A Side-Channel Attack Against Classic McEliece When Loading the Goppa PolynomialBoly Seck, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Idy Diop, Morgan Barbier, Jean Belo Klamti, Vincent Grosso, Brice Colombier. 105-125 [doi]
- Universal Hashing Based on Field Multiplication and (Near-)MDS MatricesKoustabh Ghosh, Jonathan Fuchs, Parisa Amiri-Eliasi, Joan Daemen. 129-150 [doi]
- Invertible Quadratic Non-linear Functions over $\mathbb {F}_p^n$ via Multiple Local MapsGinevra Giordani, Lorenzo Grassi 0001, Silvia Onofri, Marco Pedicini. 151-176 [doi]
- Poseidon2: A Faster Version of the Poseidon Hash FunctionLorenzo Grassi 0001, Dmitry Khovratovich, Markus Schofnegger. 177-203 [doi]
- From Unbalanced to Perfect: Implementation of Low Energy Stream CiphersJikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang. 204-226 [doi]
- The Special Case of Cyclotomic Fields in Quantum Algorithms for Unit GroupsRazvan Barbulescu, Adrien Poulalion. 229-251 [doi]
- Improved Cryptanalysis of the Multi-Power RSA Cryptosystem VariantAbderrahmane Nitaj, Maher Boudabra. 252-269 [doi]
- The Curious Case of the Half-Half Bitcoin ECDSA NoncesDylan Rowe, Joachim Breitner, Nadia Heninger. 273-284 [doi]
- Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous FinalityMario Larangeira, Maxim Jourenko. 285-313 [doi]
- ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted DomainPierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey, Martin Zuber. 317-343 [doi]
- Concrete Security from Worst-Case to Average-Case Lattice ReductionsJoel Gärtner. 344-369 [doi]
- Finding and Evaluating Parameters for BGVJohannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj. 370-394 [doi]
- Quantum Search-to-Decision Reduction for the LWE ProblemKyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida. 395-413 [doi]
- Fast Falcon Signature Generation and Verification Using ARMv8 NEON InstructionsDuc Tri Nguyen, Kris Gaj. 417-441 [doi]
- Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7James Howe, Bas Westerbaan. 442-462 [doi]
- Impossibilities in Succinct Arguments: Black-Box Extraction and MoreMatteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh, Janno Siim. 465-489 [doi]
- Applications of Timed-Release Encryption with Implicit AuthenticationAngelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia. 490-515 [doi]