Abstract is missing.
- Fast Practical Lattice Reduction Through Iterated CompressionKeegan Ryan, Nadia Heninger. 3-36 [doi]
- Does the Dual-Sieve Attack on Learning with Errors Even Work?Léo Ducas, Ludo N. Pulles. 37-69 [doi]
- Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery AttacksTianrui Wang, Anyu Wang, Xiaoyun Wang. 70-100 [doi]
- Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence ProblemWard Beullens. 101-126 [doi]
- Analysis of the Security of the PSSI Problem and Cryptanalysis of the Durandal Signature SchemeNicolas Aragon, Victor Dyseryn, Philippe Gaborit. 127-149 [doi]
- Finding Short Integer Solutions When the Modulus Is SmallLéo Ducas, Thomas Espitau, Eamonn W. Postlethwaite. 150-176 [doi]
- Practical-Time Related-Key Attack on GOST with Secret S-BoxesOrr Dunkelman, Nathan Keller, Ariel Weizmann. 177-208 [doi]
- On Perfect Linear Approximations and Differentials over Two-Round SPNsChristof Beierle, Patrick Felke, Gregor Leander, Patrick P. Neumann, Lukas Stennes. 209-239 [doi]
- Differential Meet-In-The-Middle CryptanalysisChristina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia. 240-272 [doi]
- Moving a Step of ChaCha in Syncopated RhythmShichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin. 273-304 [doi]
- Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on RubatoLorenzo Grassi 0001, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang 0001. 305-339 [doi]
- Prouff and Rivain's Formal Security Proof of Masking, Revisited - Tight Bounds in the Noisy Leakage ModelLoïc Masure, François-Xavier Standaert. 343-376 [doi]
- Combined Fault and Leakage Resilience: Composability, Constructions and CompilerSebastian Berndt 0001, Thomas Eisenbarth 0001, Sebastian Faust, Marc Gourjon, Maximilian Orlt, Okan Seker. 377-409 [doi]
- Learning with Physical Rounding for Linear and Quadratic Leakage FunctionsClément Hoffmann, Pierrick Méaux, Charles Momin, Yann Rotella, François-Xavier Standaert, Balazs Udvarhelyi. 410-439 [doi]
- Unifying Freedom and Separation for Tight Probing-Secure CompositionSonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb. 440-472 [doi]
- Twin Column Parity Mixers and Gaston - A New Mixing Layer and PermutationSolane El Hirch, Joan Daemen, Raghvendra Rohit 0001, Rusydi H. Makarim. 475-506 [doi]
- New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression ModeClémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems. 507-539 [doi]
- Coefficient Grouping for Complex Affine LayersFukang Liu, Lorenzo Grassi 0001, Clémence Bouvier, Willi Meier, Takanori Isobe 0001. 540-572 [doi]
- Horst Meets Fluid-SPN: Griffin for Zero-Knowledge ApplicationsLorenzo Grassi 0001, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang 0001. 573-606 [doi]
- On the Security of Keyed Hashing Based on Public PermutationsJonathan Fuchs, Yann Rotella, Joan Daemen. 607-627 [doi]
- Revisiting the Indifferentiability of the Sum of PermutationsAldo Gunsing, Ritam Bhaumik, Ashwin Jha, Bart Mennink, Yaobin Shen. 628-660 [doi]
- When Messages Are Keys: Is HMAC a Dual-PRF?Matilda Backendal, Mihir Bellare, Felix Günther 0001, Matteo Scarlata. 661-693 [doi]
- Layout Graphs, Random Walks and the t-Wise Independence of SPN Block CiphersTianren Liu, Angelos Pelecanos, Stefano Tessaro, Vinod Vaikuntanathan. 694-726 [doi]
- CSI -Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a TwistShuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin. 729-761 [doi]
- Weak Instances of Class Group Action Based Cryptography via Self-pairingsWouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren. 762-792 [doi]