Abstract is missing.
- How Fast Can SM4 be in Software?Xin Miao, Chun Guo 0002, Meiqin Wang, Weijia Wang 0003. 3-22 [doi]
- LLLWBC: A New Low-Latency Light-Weight Block CipherLei Zhang, Ruichen Wu, Yuhan Zhang, Yafei Zheng, Wenling Wu. 23-42 [doi]
- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed BitsWeiwei Cao, Wentao Zhang, Chunning Zhou. 43-63 [doi]
- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and SignatureMin Zhang, Binbin Tu, Yu Chen. 67-86 [doi]
- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its ApplicationsWenqiu Ma, Rui Zhang 0016. 87-107 [doi]
- McEliece-Type Encryption Based on Gabidulin Codes with No Hidden StructureWenshuo Guo, Fangwei Fu. 108-126 [doi]
- Optimizing the Depth of Quantum Implementations of Linear LayersChengkai Zhu, Zhenyu Huang 0004. 129-147 [doi]
- IND-CCA Security of Kyber in the Quantum Random Oracle Model, RevisitedZhao Chen, Xianhui Lu, Dingding Jia, Bao Li 0001. 148-166 [doi]
- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary CollusionYou Chen, Ning Ding 0001, Dawu Gu, Yang Bian. 169-191 [doi]
- Amortizing Division and ExponentiationCong Zhang, Shuaishuai Li, Dongdai Lin. 192-210 [doi]
- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFTChenmeng Li, Baofeng Wu, Dongdai Lin. 213-233 [doi]
- Cryptanalysis of CiminionLulu Zhang, Meicheng Liu, Shuaishuai Li, Dongdai Lin. 234-251 [doi]
- Clustering Effect of Iterative Differential and Linear TrailsTianyou Ding, Wentao Zhang, Chunning Zhou. 252-271 [doi]
- Differential Cryptanalysis of Round-Reduced SPEEDY FamilyQingyuan Yu, Keting Jia, Guangnan Zou, Guoyan Zhang. 272-291 [doi]
- A Note on Inverted Twisted Edwards CurveLuying Li, Wei Yu. 295-304 [doi]
- Efficiently Computable Complex Multiplication of Elliptic CurvesXiao Li, Wei Yu, Yuqing Zhu 0003, Zhizhong Pan. 305-317 [doi]
- Several Classes of Niho Type Boolean Functions with Few Walsh Transform ValuesYanan Wu, Nian Li, Xiangyong Zeng, Yuhua Cai. 318-333 [doi]
- Higher-Order Masking Scheme for Trivium Hardware ImplementationBohan Li 0004, Hailong Zhang 0001, Dongdai Lin. 337-356 [doi]
- An Experimentally Verified Attack on 820-Round TriviumCheng Che, Tian Tian. 357-369 [doi]
- HinPage: Illegal and Harmful Webpage Identification Using Transductive ClassificationYunfan Li, Lingjing Yu, Qingyun Liu. 373-390 [doi]
- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous ReturnsQintao Shen, Hongyu Sun, Guozhu Meng, Kai Chen 0012, Yuqing Zhang 0001. 391-407 [doi]
- Efficient DNN Backdoor Detection Guided by Static Weight AnalysisQi Wang, Wenxin Li, Kang Yang, Yiru Zhao, Lei Zhao, Lina Wang. 408-428 [doi]
- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples Using Mimetic Feature for 3D HumansJing Li, Sisi Zhang, Xingbin Wang, Rui Hou 0001. 429-444 [doi]
- Subfield Attacks on HSVP in Ideal LatticesZhili Dong, Shixin Tian, Kunpeng Wang, Chang Lv. 447-462 [doi]
- On the Measurement and Simulation of the BKZ Behavior for q-ary LatticesZishen Zhao, Guangwu Xu. 463-482 [doi]
- Inferring Sequences Produced by the Quadratic GeneratorJing Gao, Jun Xu, Lei Hu. 483-494 [doi]