Abstract is missing.
- The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offsEmanuele Bellini 0002, David Gérault, Juan Grados 0002, Thomas Peyrin. 3-26 [doi]
- Quasidifferential Saves Infeasible Differential - Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFTChengcheng Chang, Meiqin Wang, Wei Wang 0035, Kai Hu 0001. 27-50 [doi]
- Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear LayerQingliang Hou, Kuntong Li, Guoyan Zhang, Yanzhao Shen, Qidi You, Xiaoyang Dong 0001. 51-74 [doi]
- Comprehensive Robustness Analysis of GCM, CCM, and OCB3Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu. 75-98 [doi]
- Quantum Chosen-Ciphertext Attacks Based on Simon's Algorithm Against Unified StructuresXiaoyu Wang, Zejun Xiang 0001, Shasha Zhang, Siwei Chen 0005, Xiangyong Zeng. 99-122 [doi]
- Improved Key Recovery Attacks of AsconShuo Peng, Kai Hu 0001, Jiahui He, Meiqin Wang. 123-146 [doi]
- DSKE: Digital Signatures with Key ExtractionZhipeng Wang, Orestis Alpos, Alireza Kavousi, Harry W. H. Wong, Sze Yiu Chau, Duc Viet Le 0001, Christian Cachin. 149-173 [doi]
- Simplified Adaptively Secure Threshold BLS SignaturesBenoît Libert. 174-197 [doi]
- Non-interactive Threshold BBS+ from Pseudorandom CorrelationsSebastian Faust, Carmit Hazay, David Kretzler, Leandro Rometsch, Benjamin Schlosser. 198-222 [doi]
- Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic ConstructionKyoichi Asano, Yohei Watanabe 0001. 223-246 [doi]
- Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate-and Code-Based PQCQuinten Norga, Suparna Kundu, Uttam Kumar Ojha, Anindya Ganguly, Angshuman Karmakar, Ingrid Verbauwhede. 249-272 [doi]
- Post-quantum Online/Offline SignaturesMartin R. Albrecht, Nicolas Gama, James Howe, Anand Kumar Narayanan. 273-300 [doi]
- How (Not) to Hash into Class Groups of Imaginary Quadratic Fields?István András Seres, Péter Burcsi, Péter Kutas. 303-326 [doi]
- Sequential Indifferentiability of 7-Round Misty StructuresJiayi Ai, Chun Guo 0008. 327-348 [doi]
- Secure Computation with Penalties, Revisited: How to Handle Coins with Various ColorsTakeshi Nakai. 351-374 [doi]
- Universal Adaptor Signatures from Blackbox Multi-party ComputationMichele Ciampi, Xiangyu Liu, Ioannis Tzannetos, Vassilis Zikas. 375-398 [doi]
- Affine Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block CipherZexuan Chen, Jiqiang Lu. 401-425 [doi]