Abstract is missing.
- A New Approach Based on Quadratic Forms to Attack the McEliece CryptosystemAlain Couvreur, Rocco Mora, Jean-Pierre Tillich. 3-38 [doi]
- Solving the Hidden Number Problem for CSIDH and CSURF via Automated CoppersmithJonas Meers, Julian Nowakowski. 39-71 [doi]
- Memory-Efficient Attacks on Small LWE KeysAndre Esser 0001, Rahul Girme, Arindam Mukherjee 0003, Santanu Sarkar 0001. 72-105 [doi]
- Too Many Hints - When LLL Breaks LWEAlexander May 0001, Julian Nowakowski. 106-137 [doi]
- We are on the Same Side. Alternative Sieving Strategies for the Number Field SieveCharles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner. 138-166 [doi]
- Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism ProblemKaijie Jiang, Anyu Wang 0001, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang. 167-200 [doi]
- SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption SchemesQian Guo 0001, Denis Nabokov, Alexander Nilsson, Thomas Johansson 0001. 203-236 [doi]
- Exploiting Algebraic Structures in Probing SecurityMaxime Plançon. 237-267 [doi]
- Practically Efficient Private Set Intersection from Trusted Hardware with Side-ChannelsFelix Dörre, Jeremias Mechler, Jörn Müller-Quade. 268-301 [doi]
- Quantitative Fault Injection AnalysisJakob Feldtkeller, Tim Güneysu, Patrick Schaumont. 302-336 [doi]
- On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle ModelAbtin Afshar, Kai-Min Chung, Yao Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody. 339-368 [doi]
- Towards Compressed Permutation OraclesDominique Unruh. 369-400 [doi]
- Tighter Security for Generic Authenticated Key Exchange in the QROMJiaxin Pan, Benedikt Wagner, Runzhi Zeng. 401-433 [doi]
- Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation QueryHaodong Jiang, Zhi Ma 0001, Zhenfeng Zhang. 434-468 [doi]