Abstract is missing.
- Distinguishing and Recovering Generalized Linearized Reed-Solomon CodesFelicitas Hörmann, Hannes Bartz, Anna-Lena Horlemann. 1-20 [doi]
- Verifying Classic McEliece: Examining the Role of Formal Methods in Post-Quantum Cryptography StandardisationMartin Brain, Carlos Cid, Rachel Player, Wrenna Robson. 21-36 [doi]
- Key-Recovery Fault Injection Attack on the Classic McEliece KEMSabine Pircher, Johannes Geier, Julian Danner, Daniel Mueller-Gritschneder, Antonia Wachter-Zeh. 37-61 [doi]
- Towards Automating Cryptographic Hardware Implementations: A Case Study of HQCCarlos Aguilar Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz. 62-76 [doi]
- Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava CodesBoly Seck, Cheikh Thiécoumba Gueye, Gilbert Ndollane Dione, Jean Belo Klamti, Pierre-Louis Cayrel, Idy Diop, Ousmane Ndiaye. 77-89 [doi]
- On Decoding High-Order Interleaved Sum-Rank-Metric CodesThomas Jerkovits, Felicitas Hörmann, Hannes Bartz. 90-109 [doi]
- Information Set Decoding for Lee-Metric Codes Using Restricted BallsJessica Bariffi, Karan Khathuria, Violetta Weger. 110-136 [doi]
- Cryptanalysis of Ivanov-Krouk-Zyablov CryptosystemKirill V. Vedenev, Yu. V. Kosolapov. 137-153 [doi]