Abstract is missing.
- SQIsignHD: New Dimensions in CryptographyPierrick Dartois, Antonin Leroux, Damien Robert 0001, Benjamin Wesolowski. 3-32 [doi]
- Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier AnalysisItai Dinur. 33-62 [doi]
- AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field SigningMaria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer 0001, Krijn Reijnders. 63-93 [doi]
- The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single PermutationYusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001. 97-127 [doi]
- Partial Sums Meet FFT: Improved Attack on 6-Round AESOrr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard. 128-157 [doi]
- New Records in Collision Attacks on SHA-2Yingxin Li, Fukang Liu, Gaoli Wang. 158-186 [doi]
- Improving Linear Key Recovery Attacks Using Walsh Spectrum PuncturingAntonio Flórez-Gutiérrez, Yosuke Todo. 187-216 [doi]
- A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated ToolChristina Boura, Nicolas David 0001, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia. 217-248 [doi]
- Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW ParadigmAshwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha. 249-279 [doi]
- Improved Differential Meet-in-the-Middle CryptanalysisZahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia. 280-309 [doi]
- Post-quantum Security of Tweakable Even-Mansour, and ApplicationsGorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz, Patrick Struck. 310-338 [doi]
- Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and BeyondLing Song 0001, Qianqian Yang 0003, Yincen Chen, Lei Hu, Jian Weng 0001. 339-367 [doi]
- Massive Superpoly Recovery with a Meet-in-the-Middle Framework - Improved Cube Attacks on Trivium and KreyviumJiahui He, Kai Hu 0001, Hao Lei, Meiqin Wang. 368-397 [doi]
- Diving Deep into the Preimage Security of AES-Like HashingShiyao Chen, Jian Guo 0001, Eik List, Danping Shi, Tianyu Zhang. 398-426 [doi]
- Twinkle: Threshold Signatures from DDH with Full Adaptive SecurityRenas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu. 429-459 [doi]
- Toothpicks: More Efficient Fork-Free Two-Round Multi-signaturesJiaxin Pan, Benedikt Wagner. 460-489 [doi]