Abstract is missing.
- Security Definitions on Time-Lock PuzzlesDaiki Hiraga, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka. 3-15 [doi]
- Secret Sharing with Statistical Privacy and Computational Relaxed Non-malleabilityTasuku Narita, Fuyuki Kitagawa, Yusuke Yoshida, Keisuke Tanaka. 16-39 [doi]
- (Quantum) Cryptanalysis of Misty SchemesAline Gouget, Jacques Patarin, Ambre Toulemonde. 43-57 [doi]
- An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDHTomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi. 58-84 [doi]
- A Sub-linear Lattice-Based Submatrix Commitment SchemeHuang Lin. 87-98 [doi]
- PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software ImplementationsHangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong. 99-122 [doi]
- Curve448 on 32-Bit ARM Cortex-M4Hwajeong Seo, Reza Azarderakhsh. 125-139 [doi]
- Efficient Implementation of SHA-3 Hash Function on 8-Bit AVR-Based Sensor NodesYoungBeom Kim, Hojin Choi, Seog Chung Seo. 140-154 [doi]
- Can a Differential Attack Work for an Arbitrarily Large Number of Rounds?Nicolas T. Courtois, Jean-Jacques Quisquater. 157-181 [doi]
- Key Mismatch Attack on ThreeBears, Frodo and Round5Jan Vacek, Jan Václavek. 182-198 [doi]
- A New Non-random Property of 4.5-Round PRINCEBolin Wang, Chan Song, Wenling Wu, Lei Zhang. 199-212 [doi]
- Generative Adversarial Networks-Based Pseudo-Random Number Generator for Embedded ProcessorsHyunJi Kim, Yongbeen Kwon, Minjoo Sim, Sejin Lim, Hwajeong Seo. 215-234 [doi]
- A RDBMS-Based Bitcoin Analysis MethodHyunsu Mun, Soohyun Kim, Youngseok Lee. 235-253 [doi]
- Federated Learning in Side-Channel AnalysisHuanyu Wang, Elena Dubrova. 257-272 [doi]
- Differential Fault Based Key Recovery Attacks on TRIADMd. Iftekhar Salam, Kim Young Law, Luxin Xue, Wei-Chuen Yau. 273-287 [doi]