Abstract is missing.
- Cryptologists Should Not Ignore the History of Al-AndalusiaYvo Desmedt. 3-9 [doi]
- Compact Post-quantum Signatures from Proofs of Knowledge Leveraging Structure for the sfPKP, sfSD and sfRSD ProblemsLoïc Bidoux, Philippe Gaborit. 10-42 [doi]
- On Catalan Constant Continued FractionsDavid Naccache, Ofer Yifrach-Stav. 43-54 [doi]
- Full Post-Quantum Datagram TLS Handshake in the Internet of ThingsCallum McLoughlin, Clémentine Gritti, Juliet Samandari. 57-76 [doi]
- Moderate Classical McEliece Keys from Quasi-Centrosymmetric Goppa CodesOusmane Ndiaye. 77-90 [doi]
- QCB is Blindly UnforgeableJannis Leuther, Stefan Lucks. 91-108 [doi]
- A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen CiphertextsRuize Wang, Elena Dubrova. 109-128 [doi]
- A New Keyed Hash Function Based on Latin Squares and Error-Correcting Codes to Authenticate Users in Smart Home EnvironmentsHussain Ahmad, Carolin Hannusch. 129-135 [doi]
- Attack on a Code-Based Signature Scheme from QC-LDPC CodesTheo Fanuela Prabowo, Chik-How Tan. 136-149 [doi]
- 3 Norms of Known S-BoxesVikas Kumar, Bimal Mandal, Aditi Kar Gangopadhyay, Sugata Gangopadhyay. 150-157 [doi]
- Multi-input Non-interactive Functional Encryption: Constructions and ApplicationsGrigor Artem, Vincenzo Iovino, Razvan Rosie. 158-177 [doi]
- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block CipherMridul Nandi, Sayantan Paul, Abishanka Saha. 178-195 [doi]
- Quantum Cryptanalysis of 5 Rounds Feistel Schemes and Benes SchemesMaya Chartouny, Jacques Patarin, Ambre Toulemonde. 196-203 [doi]
- Lattice-Based Accumulator with Constant Time List Update and Constant Time VerificationYuta Maeno, Hideaki Miyaji, Atsuko Miyaji. 204-222 [doi]
- Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic EnvironmentsPhung Minh Ngoc, Mamoru Mimura. 225-241 [doi]
- Searching for Gemstones: Flawed Stegosystems May Hide Promising IdeasEvgnosia-Alexandra Kelesidis, Diana Maimut, Ilona Teodora Ciocan. 242-260 [doi]
- A Study for Security of Visual CryptographyBinh Le Thanh Thai, Hidema Tanaka. 261-277 [doi]
- Forecasting Click Fraud via Machine Learning AlgorithmsNadir Sahllal, El Mamoun Souidi. 278-289 [doi]
- An Enhanced Anonymous ECC-Based Authentication for Lightweight Application in TMISHind Idrissi, Mohammed Ennahbaoui. 290-320 [doi]
- nVladimir Edemskiy, Sofia Koltsova. 323-337 [doi]
- Weightwise Perfectly Balanced Functions and NonlinearityAgnese Gini, Pierrick Méaux. 338-359 [doi]
- Chudnovsky-Type Algorithms over the Projective Line Using Generalized Evaluation MapsStéphane Ballet, Bastien Pacifico. 360-375 [doi]
- Security Enhancement Method Using Shortened Error Correcting CodesTomohiro Sekiguchi, Hidema Tanaka. 379-394 [doi]
- An Updated Database of $\mathbb {Z}_4$ Codes and an Open Problem About Quasi-cyclic CodesNuh Aydin, Yiyang Lu, Vishad R. Onta. 395-406 [doi]