Abstract is missing.
- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-WaynessAkinori Hosoyamada, Takashi Yamakawa. 3-32 [doi]
- New Results on Gimli: Full-Permutation Distinguishers and Improved CollisionsAntonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras. 33-63 [doi]
- SQISign: Compact Post-quantum Signatures from Quaternions and IsogeniesLuca De Feo, David Kohel, Antonin Leroux, Christophe Petit, Benjamin Wesolowski. 64-93 [doi]
- Public-Key Generation with Verifiable RandomnessOlivier Blazy, Patrick Towa, Damien Vergnaud. 97-127 [doi]
- Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 SecurityBenoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu. 128-158 [doi]
- CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption ErrorsValerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks. 159-190 [doi]
- Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge SettingRupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo. 191-220 [doi]
- Security Reductions for White-Box Key-Storage in Mobile PaymentsEstuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels. 221-252 [doi]
- Circular Security Is Complete for KDM SecurityFuyuki Kitagawa, Takahiro Matsuda 0002. 253-285 [doi]
- Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their ApplicationsShuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest. 289-320 [doi]
- Post-Quantum Verification of Fujisaki-OkamotoDominique Unruh. 321-352 [doi]
- A New Decryption Failure Attack Against HQCQian Guo 0001, Thomas Johansson 0001. 353-382 [doi]
- A Bit-Vector Differential Model for the Modular Addition by a ConstantSeyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen. 385-414 [doi]
- Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic TransitionsXichao Hu, Yongqiang Li 0001, Lin Jiao, Shizhu Tian, Mingsheng Wang. 415-445 [doi]
- An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent SumsKai Hu, Siwei Sun, Meiqin Wang, Qingju Wang 0001. 446-476 [doi]
- An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMCMaria Eichlseder, Lorenzo Grassi 0001, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang 0001. 477-506 [doi]
- Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank ProblemsMagali Bardet, Maxime Bros, Daniel Cabarcas, Philippe Gaborit, Ray A. Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier A. Verbel. 507-536 [doi]
- Lower Bounds on the Degree of Block CiphersPhil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo. 537-566 [doi]
- Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT)Chun Guo 0004, Jian Guo 0001, Eik List, Ling Song 0001. 567-597 [doi]
- Minimizing the Two-Round Tweakable Even-Mansour CipherAvijit Dutta. 601-629 [doi]
- Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated EncryptionBart Mennink. 630-661 [doi]
- Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single PermutationYusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong. 662-693 [doi]
- Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACsWonseok Choi, ByeongHak Lee, Yeongmin Lee, Jooyoung Lee 0001. 697-723 [doi]
- On the Adaptive Security of MACs and PRFsAndrew Morgan, Rafael Pass, Elaine Shi. 724-753 [doi]
- How to Build Optimally Secure PRFs Using Block CiphersBenoît Cogliati, Ashwin Jha, Mridul Nandi. 754-784 [doi]
- SILVER - Statistical Independence and Leakage VerificationDavid Knichel, Pascal Sasdrich, Amir Moradi 0001. 787-816 [doi]
- Cryptanalysis of Masked Ciphers: A Not So Random IdeaTim Beyne, Siemen Dhooghe, Zhenda Zhang. 817-850 [doi]
- Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?Weijia Wang, Chun Guo 0004, François-Xavier Standaert, Yu Yu 0001, Gaëtan Cassiers. 851-880 [doi]
- Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the "Classic McEliece" Hardware Reference ImplementationNorman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska. 881-910 [doi]