Abstract is missing.
- Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle AttacksXiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang 0001. 3-33 [doi]
- A Correlation Attack on Full SNOW-V and SNOW-ViZhen Shi, Chenhui Jin, Jiyan Zhang, Ting Cui, Lin Ding 0001, Yu Jin. 34-56 [doi]
- Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2Dor Amzaleg, Itai Dinur. 57-85 [doi]
- Revamped Differential-Linear Cryptanalysis on Reduced Round ChaChaSabyasachi Dey 0001, Hirendra Kumar Garai, Santanu Sarkar 0001, Nitin Kumar Sharma. 86-114 [doi]
- A Greater GIFT: Strengthening GIFT Against Statistical CryptanalysisLing Sun 0001, Bart Preneel, Wei Wang, Meiqin Wang. 115-144 [doi]
- Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-ExponentsAlexander May 0001, Julian Nowakowski, Santanu Sarkar 0001. 147-167 [doi]
- Information-Combining Differential Fault Attacks on DEFAULTMarcel Nageler, Christoph Dobraunig, Maria Eichlseder. 168-191 [doi]
- Private Circuits with Quasilinear RandomnessVipul Goyal, Yuval Ishai, Yifan Song. 192-221 [doi]
- Mitaka: A Simpler, Parallelizable, Maskable Variant of FalconThomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi 0002, Mehdi Tibouchi, Alexandre Wallet, Yang Yu 0008. 222-253 [doi]
- A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered SimulatorsSi Gao, Elisabeth Oswald. 254-283 [doi]
- Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is PracticalSi Gao, Elisabeth Oswald, Dan Page. 284-311 [doi]
- Beyond Quadratic Speedups in Quantum Attacks on Symmetric SchemesXavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras. 315-344 [doi]
- Orientations and the Supersingular Endomorphism Ring ProblemBenjamin Wesolowski. 345-371 [doi]
- Quantum Algorithms for Variants of Average-Case Lattice Problems via FilteringYilei Chen, Qipeng Liu, Mark Zhandry. 372-401 [doi]
- Anonymous, Robust Post-quantum Public Key EncryptionPaul Grubbs, Varun Maram, Kenneth G. Paterson. 402-432 [doi]
- McEliece Needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISDAndre Esser, Alexander May 0001, Floyd Zweydinger. 433-457 [doi]
- Post-Quantum Security of the Even-Mansour CipherGorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz. 458-487 [doi]
- Watermarking PRFs Against Quantum AdversariesFuyuki Kitagawa, Ryo Nishimaki. 488-518 [doi]
- Non-malleable Commitments Against Quantum AttacksNir Bitansky, Huijia Lin, Omri Shmueli. 519-550 [doi]
- Anonymity of NIST PQC Round 3 KEMsKeita Xagawa. 551-581 [doi]
- Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear FormsGang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo. 582-612 [doi]
- On IND-qCCA Security in the ROM and Its Applications - CPA Security Is Sufficient for TLS 1.3Loïs Huguenin-Dumittan, Serge Vaudenay. 613-642 [doi]
- On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and CryptographyLéo Ducas, Wessel P. J. van Woerden. 643-673 [doi]
- Online-Extractability in the Quantum Random-Oracle ModelJelle Don, Serge Fehr, Christian Majenz, Christian Schaffner. 677-706 [doi]
- Constant-Round Blind Classical Verification of Quantum SamplingKai-Min Chung, Yi Lee, Han-Hsuan Lin, Xiaodi Wu. 707-736 [doi]
- Authentication in the Bounded Storage ModelYevgeniy Dodis, Willy Quach, Daniel Wichs. 737-766 [doi]
- Secure Non-interactive Simulation: Feasibility and RateHamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen. 767-796 [doi]
- Secure Non-interactive Reduction and Spectral Analysis of CorrelationsPratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran, Mohammad Ali Rehan. 797-827 [doi]