Abstract is missing.
- On the Hardness of the NTRU ProblemAlice Pellet-Mary, Damien Stehlé. 3-35 [doi]
- A Geometric Approach to Linear CryptanalysisTim Beyne. 36-66 [doi]
- Lattice Enumeration for Tower NFS: A 521-Bit Discrete Logarithm ComputationGabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot. 67-96 [doi]
- Partial Key Exposure Attack on Short Secret Exponent CRT-RSAAlexander May 0001, Julian Nowakowski, Santanu Sarkar. 99-129 [doi]
- A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based AttacksVladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley. 130-159 [doi]
- Cryptanalysis of an Oblivious PRF from Supersingular IsogeniesAndrea Basso 0002, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso. 160-184 [doi]
- A Practical Key-Recovery Attack on 805-Round TriviumChen-Dong Ye, Tian Tian 0004. 187-213 [doi]
- Algebraic Attacks on Rasta and Dasta Using Low-Degree EquationsFukang Liu, Santanu Sarkar 0001, Willi Meier, Takanori Isobe 0001. 214-240 [doi]
- Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key DifferentialsXiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang 0001, Lei Hu. 241-271 [doi]
- Clustering Effect in Simon and SimeckGaëtan Leurent, Clara Pernot, André Schrottenloher. 272-302 [doi]
- New Attacks on LowMC Instances with a Single Plaintext/Ciphertext PairSubhadeep Banik, Khashayar Barooti, Serge Vaudenay, Hailun Yan. 303-331 [doi]
- Convexity of Division Property Transitions: Theory, Algorithms and Compact ModelsAleksei Udovenko. 332-361 [doi]
- Strong and Tight Security Guarantees Against Integral DistinguishersPhil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo. 362-391 [doi]
- Massive Superpoly Recovery with Nested Monomial PredictionsKai Hu 0001, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang 0001. 392-421 [doi]
- Quantum Linearization AttacksXavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher. 422-452 [doi]
- Generic Framework for Key-Guessing ImprovementsMarek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia. 453-483 [doi]
- On the Non-tightness of Measurement-Based Reductions for Key Encapsulation Mechanism in the Quantum Random Oracle ModelHaodong Jiang, Zhenfeng Zhang, Zhi Ma. 487-517 [doi]
- Redeeming Reset Indifferentiability and Applications to Post-quantum SecurityMark Zhandry. 518-548 [doi]
- Franchised Quantum MoneyBhaskar Roberts, Mark Zhandry. 549-574 [doi]
- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NPJun Yan. 575-605 [doi]
- Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical CommunicationTaiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa. 606-636 [doi]
- Tight Adaptive Reprogramming in the QROMAlex B. Grilo, Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz. 637-667 [doi]
- QCB: Efficient Quantum-Secure Authenticated EncryptionRitam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin. 668-698 [doi]