Abstract is missing.
- Truncated Boomerang Attacks and Application to AES-Based CiphersAugustin Bariant, Gaëtan Leurent. 3-35 [doi]
- Better Steady than Speedy: Full Break of SPEEDY-7-192Christina Boura, Nicolas David, Rachelle Heim Boissier, María Naya-Plasencia. 36-66 [doi]
- Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNYDanping Shi, Siwei Sun, Ling Song 0001, Lei Hu, Qianqian Yang 0003. 67-97 [doi]
- Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate DifferentiationItai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir. 98-127 [doi]
- Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral AttacksHosein Hadipour, Sadegh Sadeghi, Maria Eichlseder. 128-157 [doi]
- Meet-in-the-Middle Preimage Attacks on Sponge-Based HashingLingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang 0001. 158-188 [doi]
- Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILPFukang Liu, Gaoli Wang, Santanu Sarkar 0001, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe 0001. 189-219 [doi]
- Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal DifferentialsZhongyi Zhang, Chengan Hou, Meicheng Liu. 220-251 [doi]
- From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC ApplicationsLorenzo Grassi 0001, Morten Øygarden, Markus Schofnegger, Roman Walch. 255-286 [doi]
- Coefficient Grouping: Breaking Chaghri and MoreFukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe 0001. 287-317 [doi]
- Pitfalls and Shortcomings for Decompositions and AlignmentBaptiste Lambin, Gregor Leander, Patrick P. Neumann. 318-347 [doi]
- Generic Attack on Duplex-Based AEAD Modes Using Random Function StatisticsHenri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella. 348-378 [doi]
- Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and MoreSanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart. 379-407 [doi]
- Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive CallsChun Guo 0002, Lei Wang, Dongdai Lin. 408-439 [doi]
- Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding CollisionsCody Freitag, Ashrujit Ghoshal, Ilan Komargodski. 440-469 [doi]
- Proof of Mirror Theory for a Wide Range of $\xi _{\max }$Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha. 470-501 [doi]
- Non-adaptive Universal One-Way Hash Functions from Arbitrary One-Way FunctionsXinyu Mao, Noam Mazor, Jiapeng Zhang. 502-531 [doi]
- XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One ComputationZhenzhen Bao, Seongha Hwang, Akiko Inoue, ByeongHak Lee, Jooyoung Lee 0001, Kazuhiko Minematsu. 532-561 [doi]
- Improved Power Analysis Attacks on FalconShiduo Zhang, Xiuhan Lin, Yang Yu 0008, Weijia Wang 0003. 565-595 [doi]
- Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime CiphersLoïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert. 596-627 [doi]
- One-Hot Conversion: Towards Faster Table-Based A2B ConversionJan-Pieter D'Anvers. 628-657 [doi]