Abstract is missing.
- A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved AlgorithmsNicky Mouha, Christopher Celi. 3-28 [doi]
- Optimisations and Tradeoffs for HElibAnamaria Costache, Lea Nürnberger, Rachel Player. 29-53 [doi]
- Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition ChainRen Taguchi, Atsushi Takayasu. 57-83 [doi]
- Classical and Quantum Security of Elliptic Curve VRF, via Relative IndifferentiabilityChris Peikert, Jiayu Xu. 84-112 [doi]
- On-Line/Off-Line DCR-Based Homomorphic Encryption and ApplicationsMarc Joye. 115-131 [doi]
- A Practical Compiler for Attribute-Based Encryption: New Decentralized Constructions and MoreMarloes Venema. 132-159 [doi]
- PAPR: Publicly Auditable Privacy Revocation for Anonymous CredentialsJoakim Brorsson, Bernardo David, Lorenzo Gentile, Elena Pagnin, Paul Stankovski Wagner. 163-190 [doi]
- Unlinkable Policy-Based Sanitizable SignaturesIsmail Afia, Riham AlTawy. 191-221 [doi]
- Improved Graph-Based Model for Recovering Superpoly on TriviumJunjie Cheng, Kexin Qiao. 225-251 [doi]
- Fully Automated Differential-Linear Attacks Against ARX CiphersEmanuele Bellini 0002, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin. 252-276 [doi]
- An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to OrthrosKazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Takanori Isobe 0001. 277-304 [doi]
- Rotational-XOR Differential Rectangle Cryptanalysis on Simon-Like CiphersSiwei Chen, Mingming Zhu, Zejun Xiang 0001, Runqing Xu, Xiangyong Zeng, Shasha Zhang. 305-330 [doi]
- Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFsNavid Alamati, Hart Montgomery, Sikhar Patranabis. 333-359 [doi]
- Putting the Online Phase on a Diet: Covert Security from Short MACsSebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser. 360-386 [doi]
- One Round Threshold ECDSA Without Roll CallAlexandre Bouez, Kalpana Singh. 389-414 [doi]
- Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in PracticeAndrew Fregly, Joseph Harvey, Burton S. Kaliski Jr., Swapneel Sheth. 415-441 [doi]
- All Shall FA-LLL: Breaking CT-RSA 2022 and CHES 2022 Infective Countermeasures with Lattice-Based Fault AttacksGuillaume Barbu, Christophe Giraud 0001. 445-468 [doi]
- A Flexible Shared Hardware Accelerator for NIST-Recommended Algorithms CRYSTALS-Kyber and CRYSTALS-Dilithium with SCA ProtectionLuke Beckwith, Abubakr Abdulgadir, Reza Azarderakhsh. 469-490 [doi]
- NNBits: Bit Profiling with a Deep Learning Ensemble Based DistinguisherAnna Hambitzer, David Gérault, Yun-Ju Huang, Najwa Aaraj, Emanuele Bellini 0002. 493-523 [doi]
- Improved Heuristics for Low-Latency Implementations of Linear LayersQun Liu, Zheng Zhao, Meiqin Wang. 524-550 [doi]
- Authenticated Encryption for Very Short InputsAlexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata. 553-572 [doi]
- Keyed Sum of Permutations: A Simpler RP-Based PRFFerdinand Sibleyras, Yosuke Todo. 573-593 [doi]
- Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle AttacksMihir Bellare, Laura Shea. 594-621 [doi]
- Targeted Invertible Pseudorandom Functions and Deterministic Format-Transforming EncryptionSarah Miracle, Scott Yilek. 622-642 [doi]
- Multi-user CDH Problems and the Concrete Security of NAXOS and HMQVEike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud. 645-671 [doi]
- Wireless-Channel Key ExchangeAfonso Arriaga, Petra Sala, Marjan Skrobot. 672-699 [doi]