Abstract is missing.
- Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-Based AttacksYiming Gao, Jinghui Wang, Honggang Hu, Binang He. 3-34 [doi]
- Don't Use it Twice! Solving Relaxed Linear Equivalence ProblemsAlessandro Budroni, Jesús-Javier Chi-Domínguez, Giuseppe D'Alconzo, Antonio J. Di Scala, Mukul Kulkarni. 35-65 [doi]
- Rare Structures in Tensor Graphs - Bermuda Triangles for Cryptosystems Based on the Tensor Isomorphism ProblemLars Ran, Simona Samardjiska. 66-96 [doi]
- It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-Channel AnalysisSengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, Guilherme Perin. 99-131 [doi]
- ZKFault: Fault Attack Analysis on Zero-Knowledge Based Post-quantum Digital Signature SchemesPuja Mondal, Supriya Adhikary, Suparna Kundu, Angshuman Karmakar. 132-167 [doi]
- More Vulnerabilities of Linear Structure Sbox-Based Ciphers Reveal Their Inability to Resist DFAAmit Jana, Anup Kumar Kundu, Goutam Paul 0001. 168-203 [doi]
- Hard-Label Cryptanalytic Extraction of Neural Network ModelsYi Chen 0011, Xiaoyang Dong 0001, Jian Guo 0001, Yantian Shen, Anyu Wang 0001, Xiaoyun Wang 0001. 207-236 [doi]
- Analysis on Sliced Garbling via Algebraic ApproachTaechan Kim. 237-265 [doi]
- Revisiting OKVS-Based OPRF and PSI: Cryptanalysis and Better ConstructionKyoohyung Han, Seongkwang Kim, ByeongHak Lee, Yongha Son. 266-296 [doi]
- Reducing the Number of Qubits in Quantum Information Set DecodingClémence Chevignard, Pierre-Alain Fouque, André Schrottenloher. 299-329 [doi]
- On the Semidirect Discrete Logarithm Problem in Finite GroupsChristopher Battarbee, Giacomo Borin, Julian Brough, Ryann Cartor, Tobias Hemmert, Nadia Heninger, David Jao, Delaram Kahrobaei, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, Rainer Steinwandt. 330-357 [doi]
- Quantum Circuits of AES with a Low-Depth Linear Layer and a New StructureHaotian Shi, Xiutao Feng. 358-395 [doi]
- Quantum Algorithms for Fast Correlation Attacks on LFSR-Based Stream CiphersAkinori Hosoyamada. 396-430 [doi]