Abstract is missing.
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user SecurityViet Tung Hoang, Stefano Tessaro. 3-32 [doi]
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersThomas Peyrin, Yannick Seurin. 33-63 [doi]
- XPX: Generalized Tweakable Even-Mansour with Improved Security GuaranteesBart Mennink. 64-94 [doi]
- Indifferentiability of 8-Round Feistel NetworksYuanxi Dai, John P. Steinberger. 95-120 [doi]
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACBenoît Cogliati, Yannick Seurin. 121-149 [doi]
- A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding SchemesMartin Albrecht, Shi Bai, Léo Ducas. 153-178 [doi]
- A Practical Cryptanalysis of the Algebraic EraserAdi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban. 179-189 [doi]
- Lattice-Based Fully Dynamic Multi-key FHE with Short CiphertextsZvika Brakerski, Renen Perlman. 190-213 [doi]
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNYu Yu, Jiang Zhang. 214-243 [doi]
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3Mihir Bellare, Björn Tackmann. 247-276 [doi]
- A Modular Treatment of Cryptographic APIs: The Symmetric-Key CaseThomas Shrimpton, Martijn Stam, Bogdan Warinschi. 277-307 [doi]
- Encryption Switching ProtocolsGeoffroy Couteau, Thomas Peters, David Pointcheval. 308-338 [doi]
- Message Transmission with Reverse Firewalls - Secure Communication on Corrupted MachinesYevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz. 341-372 [doi]
- Big-Key Symmetric Encryption: Resisting Key ExfiltrationMihir Bellare, Daniel Kane, Phillip Rogaway. 373-402 [doi]
- Backdoors in Pseudorandom Number Generators: Possibility and Impossibility ResultsJean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage. 403-432 [doi]
- A 2^70 Attack on the Full MISTY1Achiya Bar-On, Nathan Keller. 435-456 [doi]
- Cryptanalysis of the FLIP Family of Stream CiphersSébastien Duval, Virginie Lallemand, Yann Rotella. 457-475 [doi]
- The Magic of ELFsMark Zhandry. 479-508 [doi]
- Breaking the Circuit Size Barrier for Secure Computation Under DDHElette Boyle, Niv Gilboa, Yuval Ishai. 509-539 [doi]
- Extended Tower Number Field Sieve: A New Complexity for the Medium Prime CaseTaechan Kim 0001, Razvan Barbulescu. 543-571 [doi]
- Efficient Algorithms for Supersingular Isogeny Diffie-HellmanCraig Costello, Patrick Longa, Michael Naehrig. 572-601 [doi]
- New Insights on AES-Like SPN CiphersBing Sun, Meicheng Liu, Jian Guo 0001, Longjiang Qu, Vincent Rijmen. 605-624 [doi]
- Lightweight Multiplication in GF(2^n) with Applications to MDS MatricesChristof Beierle, Thorsten Kranz, Gregor Leander. 625-653 [doi]
- Another View of the Division PropertyChristina Boura, Anne Canteaut. 654-682 [doi]