Abstract is missing.
- Block Cipher Invariants as Eigenvectors of Correlation MatricesTim Beyne. 3-31 [doi]
- Practical Attacks Against the Walnut Digital Signature SchemeWard Beullens, Simon R. Blackburn. 35-61 [doi]
- Two Attacks on Rank Metric Code-Based Schemes: RankSign and an IBE SchemeThomas Debris-Alazard, Jean-Pierre Tillich. 62-92 [doi]
- An Efficient Structural Attack on NIST Submission DAGSÉlise Barelli, Alain Couvreur. 93-118 [doi]
- Pattern Matching on Encrypted StreamsNicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, Olivier Sanders. 121-148 [doi]
- SQL on Structurally-Encrypted DatabasesSeny Kamara, Tarik Moataz. 149-180 [doi]
- Parameter-Hiding Order Revealing EncryptionDavid Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang. 181-210 [doi]
- Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user SecurityChun Guo, Lei Wang. 213-243 [doi]
- Short Variable Length Domain Extenders with Beyond Birthday Bound SecurityYu Long Chen, Bart Mennink, Mridul Nandi. 244-274 [doi]
- Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård ConstructionsAkinori Hosoyamada, Kan Yasuda. 275-304 [doi]
- Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher ModelByeongHak Lee, Jooyoung Lee. 305-335 [doi]
- ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher CallsRitam Bhaumik, Eik List, Mridul Nandi. 336-366 [doi]
- Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZShi Bai, Damien Stehlé, Weiqiang Wen. 369-404 [doi]
- Quantum Lattice Enumeration and Tweaking Discrete PruningYoshinori Aono, Phong Q. Nguyen, Yixin Shen. 405-434 [doi]
- On the Hardness of the Computational Ring-LWR Problem and Its ApplicationsLong Chen, Zhenfeng Zhang, Zhenfei Zhang. 435-464 [doi]
- On the Statistical Leak of the GGH13 Multilinear Map and Some VariantsLéo Ducas, Alice Pellet-Mary. 465-493 [doi]
- LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISSJonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi. 494-524 [doi]
- Quantum Algorithms for the k -xor ProblemLorenzo Grassi 0001, María Naya-Plasencia, André Schrottenloher. 527-559 [doi]
- Hidden Shift Quantum Cryptanalysis and ImplicationsXavier Bonnetain, María Naya-Plasencia. 560-592 [doi]
- Arya: Nearly Linear-Time Zero-Knowledge Proofs for Correct Program ExecutionJonathan Bootle, Andrea Cerulli, Jens Groth, Sune K. Jakobsen, Mary Maller. 595-626 [doi]
- Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with ApplicationsMasayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy 0003. 627-656 [doi]