Abstract is missing.
- Finding and Protecting the Weakest Link - On Side-Channel Attacks on y\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textbf{y}$$\end{document} in Masked ML-DSAJulius Hermelink, Kai-Chun Ning, Richard Petri 0001. 3-37 [doi]
- Leakage-Resilient Circuits Against sfNC1, RevisitedYuyu Wang 0001. 38-69 [doi]
- Key Recovery from Side-Channel Power Analysis Attacks on Non-SIMD HQC DecryptionNathan Maillet, Cyrius Nugier, Vincent Migliore, Jean-Christophe Deneuville. 70-102 [doi]
- Crowhammer: Full Key Recovery Attack on Falcon with a Single Rowhammer Bit FlipCalvin Abou Haidar, Quentin Payet, Mehdi Tibouchi. 103-135 [doi]
- Guess-and-Determine Rebound: Applications to Key Collisions on AESLingyue Qin, Wenquan Bi, Xiaoyang Dong 0001. 139-171 [doi]
- Breaking the IEEE Encryption Standard XCB-AES in Two QueriesAmit Singh Bhati, Elena Andreeva 0001. 172-199 [doi]
- New Collision Attacks on Round-Reduced SHA-512Yingxin Li, Fukang Liu, Gaoli Wang, Haifeng Qian, Keting Jia, Xiangyu Kong. 200-229 [doi]
- How to Recover the Full Plaintext of XCBPeng Wang 0009, Shuping Mao, Ruozhou Xu, Jiwu Jing, Yuewu Wang. 230-259 [doi]
- Triangulating Meet-in-the-Middle AttackBoxin Zhao, Qingliang Hou, Lingyue Qin, Xiaoyang Dong 0001. 260-292 [doi]
- Unlocking Mix-Basis Potential: Geometric Approach for Combined AttacksKai Hu 0001, Chi Zhang, Chengcheng Chang, Jiashu Zhang, Meiqin Wang, Thomas Peyrin. 293-334 [doi]
- Improved Resultant Attack Against Arithmetization-Oriented PrimitivesAugustin Bariant, Aurélien Boeuf, Pierre Briaud, Maël Hostettler, Morten Øygarden, Håvard Raddum. 335-367 [doi]
- Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108Ritam Bhaumik, Avijit Dutta, Akiko Inoue, Tetsu Iwata, Ashwin Jha 0001, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro. 371-403 [doi]
- The Exact Multi-User Security of Key-Alternating Feistel Ciphers with a Single PermutationYusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001. 404-436 [doi]
- Tweakable Permutation-Based Luby-Rackoff ConstructionsBishwajit Chakraborty 0002, Abishanka Saha. 437-466 [doi]
- Enhancing Provable Security and Efficiency of Permutation-Based DRBGsWoohyuk Chung, Seongha Hwang, Hwigyeom Kim, Jooyoung Lee 0001. 467-496 [doi]
- Integral Resistance of Block Ciphers with Key Whitening by Modular AdditionChristof Beierle, Phil Hebborn, Gregor Leander, Yevhen Perehuda. 497-529 [doi]
- Transistor: a TFHE-Friendly Stream CipherJules Baudrin, Sonia Belaïd, Nicolas Bon, Christina Boura, Anne Canteaut, Gaëtan Leurent, Pascal Paillier, Léo Perrin, Matthieu Rivain, Yann Rotella, Samuel Tap. 530-565 [doi]
- A Fully-Adaptive Threshold Partially-Oblivious PRFRuben Baecker, Paul Gerhart, Daniel Rausch 0001, Dominique Schröder. 569-597 [doi]
- Adaptive Security for Constrained PRFsKaishuo Cheng, Joseph Jaeger. 598-627 [doi]
- Succinct PPRFs via Memory-Tight ReductionsJoël Alwen, Chris Brzuska, Jérôme Govinden, Patrick Harasser, Stefano Tessaro. 628-662 [doi]
- Pseudorandom Obfuscation and ApplicationsPedro Branco 0005, Nico Döttling, Abhishek Jain 0002, Giulio Malavolta, Surya Mathialagan, Spencer Peters, Vinod Vaikuntanathan. 663-698 [doi]