Abstract is missing.
- Revisiting the Security of COMET Authenticated Encryption SchemeShay Gueron, Ashwin Jha, Mridul Nandi. 3-25 [doi]
- tHyENA: Making HyENA Even SmallerAvik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi. 26-48 [doi]
- Panther: A Sponge Based Lightweight Authenticated Encryption SchemeK. V. L. Bhargavi, Chungath Srinivasan, K. V. Lakshmy. 49-70 [doi]
- Crooked Indifferentiability of Enveloped XOR RevisitedRishiraj Bhattacharyya, Mridul Nandi, Anik Raychaudhuri. 73-92 [doi]
- Sequential Indifferentiability of Confusion-Diffusion NetworksQi Da, Shanjie Xu, Chun Guo. 93-113 [doi]
- Elastic-Tweak: A Framework for Short Tweak Tweakable Block CipherAvik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki. 114-137 [doi]
- Three Input Exclusive-OR Gate Support for Boyar-Peralta's AlgorithmAnubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe 0001. 141-158 [doi]
- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-BoxesZhenyu Lu, Weijia Wang, Kai Hu 0001, Yanhong Fan, Lixuan Wu, Meiqin Wang. 159-178 [doi]
- Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover's AttacksRavi Anand, Arpita Maitra, Subhamoy Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay. 179-198 [doi]
- Analyzing Masked Ciphers Against Transition and Coupling EffectsSiemen Dhooghe. 201-223 [doi]
- A Lightweight Implementation of Saber Resistant Against Side-Channel AttacksAbubakr Abdulgadir, Kamyar Mohajerani, Viet Ba Dang, Jens-Peter Kaps, Kris Gaj. 224-245 [doi]
- Improving First-Order Threshold Implementations of SKINNYAndrea Caforio, Daniel Collins, Ognjen Glamocanin, Subhadeep Banik. 246-267 [doi]
- Differential Fault Attack on EspressoBhagwan N. Bathe, Siddhartha Tiwari, Ravi Anand, Dibyendu Roy 0001, Subhamoy Maitra. 271-286 [doi]
- Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar RandomizationAndy Russon. 287-310 [doi]
- Fault-Enabled Chosen-Ciphertext Attacks on KyberJulius Hermelink, Peter Pessl, Thomas Pöppelmann. 311-334 [doi]
- DeCSIDH: Delegating Isogeny Computations in the CSIDH SettingRobi Pedersen. 337-361 [doi]
- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing SignaturesSurbhi Shaw, Ratna Dutta. 362-386 [doi]
- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic SettingSanjit Chatterjee, Akansha Dimri, Tapas Pandit. 387-412 [doi]
- Identity-Based Matchmaking Encryption Without Random OraclesDanilo Francati, Alessio Guidi, Luigi Russo, Daniele Venturi 0001. 415-435 [doi]
- Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake BlockchainSeiya Nuta, Jacob C. N. Schuldt, Takashi Nishide. 436-461 [doi]
- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACEDeepak Kumaraswamy, Srinivas Vivek 0001. 462-484 [doi]
- Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward PrivacyNajwa Aaraj, Chiara Marcolla, Xiaojie Zhu. 487-509 [doi]
- Smooth Zero-Knowledge Hash FunctionsBehzad Abdolmaleki, Hamidreza Khoshakhlagh, Helger Lipmaa. 510-535 [doi]
- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function EvaluationKodai Toyoda, Daiki Miyahara, Takaaki Mizuki. 536-555 [doi]
- On Elapsed Time Consensus ProtocolsMic Bowman, Debajyoti Das 0001, Avradip Mandal, Hart Montgomery. 559-583 [doi]
- Time-Release Cryptography from Minimal Circuit AssumptionsSamuel Jaques, Hart Montgomery, Razvan Rosie, Arnab Roy 0001. 584-606 [doi]
- Succinct Publicly-Certifiable Proofs - Or, Can a Blockchain Verify a Designated-Verifier Proof?Matteo Campanelli, Hamidreza Khoshakhlagh. 607-631 [doi]