Abstract is missing.
- Enhancing the Related-Key Security of PIPO Through New Key SchedulesSeungjun Baek 0002, Giyoon Kim, Yongjin Jeon, Jongsung Kim. 3-18 [doi]
- Distinguisher and Related-Key Attack on HALFLOOP-96Jinpeng Liu, Ling Sun. 19-40 [doi]
- Revisiting Key Switching Techniques with Applications to Light-Key FHERuida Wang, Zhihao Li, Benqiang Wei, Chunling Chen, Xianhui Lu, Kunpeng Wang. 41-64 [doi]
- Optimized Quantum Implementation of SEEDYujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo. 65-78 [doi]
- Depth-Optimized Quantum Implementation of ARIAYujin Yang, Kyungbae Jang, Yujin Oh, Hwajeong Seo. 79-96 [doi]
- Finding Shortest Vector Using Quantum NV Sieve on GroverHyunJi Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwang-il Bae, Il Kwon Sohn, Hwajeong Seo. 97-118 [doi]
- Experiments and Resource Analysis of Shor's Factorization Using a Quantum SimulatorJunpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro. 119-139 [doi]
- Quantum Circuits for High-Degree and Half-Multiplication for Post-quantum AnalysisRini Wisnu Wardhani, Dedy Septono Catur Putranto, Howon Kim 0001. 140-160 [doi]
- Extended Attacks on ECDSA with Noisy Multiple Bit Nonce LeakagesShunsuke Osaki, Noboru Kunihiro. 163-184 [doi]
- Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its CountermeasureKeon-Hee Choi, Ju-Hwan Kim, Jaeseung Han, Jae-Won Huh, Dong-Guk Han. 185-201 [doi]
- A Lattice Attack on CRYSTALS-Kyber with Correlation Power AnalysisYen-Ting Kuo, Atsushi Takayasu. 202-220 [doi]
- Side-Channel Analysis on Lattice-Based KEM Using Multi-feature Recognition - The Case Study of KyberYuan Ma, Xinyue Yang, an Wang, Congming Wei, Tianyu Chen, Haotong Xu. 221-239 [doi]
- Not Optimal but Efficient: A Distinguisher Based on the Kruskal-Wallis TestYan Yan 0018, Elisabeth Oswald, Arnab Roy 0005. 240-258 [doi]
- 1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication CostMasayuki Tezuka, Keisuke Tanaka. 261-281 [doi]
- Compact Identity-Based Signature and Puncturable Signature from SQISignSurbhi Shaw, Ratna Dutta. 282-305 [doi]
- High Weight Code-Based Signature Scheme from QC-LDPC CodesChik-How Tan, Theo Fanuela Prabowo. 306-323 [doi]