Abstract is missing.
- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite FieldsChristoph Dobraunig, Lorenzo Grassi 0001, Anna Guinet, Daniël Kuijsters. 3-34 [doi]
- Mind the Middle Layer: The HADES Design Strategy RevisitedNathan Keller, Asaf Rosemarin. 35-63 [doi]
- Password Hashing and PreprocessingPooya Farshim, Stefano Tessaro. 64-91 [doi]
- Compactness of Hashing Modes and Efficiency Beyond Merkle TreeElena Andreeva 0001, Rishiraj Bhattacharyya, Arnab Roy 0005. 92-123 [doi]
- Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir. 127-154 [doi]
- Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes. 155-183 [doi]
- Pre-computation Scheme of Window τNAF for Koblitz Curves RevisitedWei Yu 0008, Guangwu Xu. 187-218 [doi]
- Dummy Shuffling Against Algebraic Attacks in White-Box ImplementationsAlex Biryukov, Aleksei Udovenko. 219-248 [doi]
- Advanced Lattice Sieving on GPUs, with Tensor CoresLéo Ducas, Marc Stevens 0001, Wessel P. J. van Woerden. 249-279 [doi]
- Fast Verification of Masking Schemes in Characteristic TwoNicolas Bordes, Pierre Karpman. 283-312 [doi]
- On the Power of Expansion: More Efficient Constructions in the Random Probing ModelSonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb. 313-343 [doi]
- Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit LeakagesHemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang. 344-374 [doi]
- Leakage Resilient Value Comparison with Application to Message AuthenticationChristoph Dobraunig, Bart Mennink. 377-407 [doi]
- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for FreeGianluca Brian, Antonio Faonio, Maciej Obremski, João L. Ribeiro 0001, Mark Simkin 0001, Maciej Skórski, Daniele Venturi 0001. 408-437 [doi]
- Message-Recovery Laser Fault Injection Attack on the Classic McEliece CryptosystemPierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet. 438-467 [doi]
- Multi-source Non-malleable Extractors and ApplicationsVipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu. 468-497 [doi]
- Secure Software LeasingPrabhanjan Ananth, Rolando L. La Placa. 501-530 [doi]
- Oblivious Transfer Is in MiniQCryptAlex B. Grilo, Huijia Lin, Fang Song 0001, Vinod Vaikuntanathan. 531-561 [doi]
- Security Analysis of Quantum LightningBhaskar Roberts. 562-567 [doi]
- Classical vs Quantum Random OraclesTakashi Yamakawa, Mark Zhandry. 568-597 [doi]
- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential WorkKai-Min Chung, Serge Fehr, Yu-Hsuan Huang, Tai-Ning Liao. 598-629 [doi]
- Classical Proofs of Quantum KnowledgeThomas Vidick, Tina Zhang. 630-660 [doi]
- Order-C Secure Multiparty Computation for Highly Repetitive CircuitsGabrielle Beck, Aarushi Goel, Abhishek Jain 0002, Gabriel Kaptchuk. 663-693 [doi]
- The More the Merrier: Reducing the Cost of Large Scale MPCS. Dov Gordon, Daniel Starin, Arkady Yerukhimovich. 694-723 [doi]
- Multiparty Reusable Non-interactive Secure Computation from LWEFabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin. 724-753 [doi]
- Unbounded Multi-party Computation from Learning with ErrorsPrabhanjan Ananth, Abhishek Jain 0002, Zhengzhong Jin, Giulio Malavolta. 754-781 [doi]
- Generic Compiler for Publicly Verifiable Covert Multi-Party ComputationSebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser. 782-811 [doi]
- Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary FieldsAntigoni Polychroniadou, Yifan Song. 812-841 [doi]
- Breaking the Circuit Size Barrier for Secure Computation Under Quasi-Polynomial LPNGeoffroy Couteau, Pierre Meyer. 842-870 [doi]
- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure ComputationElette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta 0001, Yuval Ishai, Nishant Kumar 0001, Mayank Rathee. 871-900 [doi]
- VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLEPeter Rindal, Phillipp Schoppmann. 901-930 [doi]