Abstract is missing.
- See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULTJonghyun Park, Jongsung Kim. 3-16 [doi]
- Implicit Key-Stretching Security of Encryption SchemesJannis Bossert, Eik List, Stefan Lucks. 17-40 [doi]
- Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum SignaturesShiyao Chen, Chun Guo 0002, Jian Guo 0001, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu. 41-60 [doi]
- Impossible Differential Cryptanalysis on Reduced-Round PRINCEcoreLi Zhang, Wenling Wu, Yongxia Mao. 61-77 [doi]
- Towards Constructing Consistent Pattern Strength Meters with User's Visual PerceptionLeo Hyun Park, Eunbi Hwang, Donggun Lee, Taekyoung Kwon 0002. 81-99 [doi]
- Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption SystemsMashari Alatawi, Nitesh Saxena. 100-123 [doi]
- Differential Testing of Cryptographic Libraries with Hybrid FuzzingHoyong Jin, Dohyeon An, Taekyoung Kwon 0002. 124-144 [doi]
- Public Key Encryption with Hierarchical Authorized Keyword SearchZi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo. 147-170 [doi]
- Private Evaluation of a Decision Tree Based on Secret SharingMohammad Nabil Ahmed, Kana Shimizu. 171-194 [doi]
- Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair LotteryMario Larangeira. 195-215 [doi]
- Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based CryptosystemsBoly Seck, Pierre-Louis Cayrel, Idy Diop, Vlad-Florin Dragoi, Kalen Couzon, Brice Colombier, Vincent Grosso. 219-234 [doi]
- Differential Fault Attack on AES Using Maximum Four Bytes Faulty CiphertextsJae-Won Huh, Dong-Guk Han. 235-245 [doi]
- A Performance Evaluation of IPsec with Post-Quantum CryptographySeungyeon Bae, Yousung Chang, Hyeongjin Park, Minseo Kim, Youngjoo Shin. 249-266 [doi]
- An Ultrafast Cryptographically Secure Pseudorandom Number GeneratorJianliang Zheng, Jie Li 0005. 267-291 [doi]
- Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj. 292-314 [doi]
- Pointcheval-Sanders Signature-Based Synchronized Aggregate SignatureMasayuki Tezuka, Keisuke Tanaka. 317-336 [doi]
- Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-HidingMasahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto. 337-362 [doi]
- Group Testing Aggregate Signatures with SoundnessShingo Sato, Junji Shikata, Tsutomu Matsumoto. 363-381 [doi]
- Attribute-Based Signatures for Range of Inner Product and Its ApplicationsMasahito Ishizaka, Kazuhide Fukushima. 382-407 [doi]
- Identity-based Interactive Aggregate Signatures from LatticesShingo Sato, Junji Shikata. 408-432 [doi]
- Analysis of (U, U+V)-code Problem with Gramian over Binary and Ternary FieldsIchiro Iwata, Yusuke Yoshida, Keisuke Tanaka. 435-449 [doi]
- A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM EmanationsRuize Wang, Kalle Ngo, Elena Dubrova. 450-471 [doi]
- Preimage Sampling in the Higher-bit Approximate Setting with a Non-spherical Gaussian SamplerAnaëlle Le Dévéhat, Shingo Hasegawa, Hiroki Shizuya. 472-490 [doi]
- leeve Construction for Multiple Proofs of OwnershipDavid Chaum, Mario Larangeira, Mario Yaksetig. 491-511 [doi]