Abstract is missing.
- On the Classical Hardness of the Semidirect Discrete Logarithm Problem in Finite GroupsMohammad Ferry Husnil Arif, Muhammad Imran 0022. 3-20 [doi]
- m)Ruby Kumari, Sumeet Saurav, Abhijit Karmakar. 21-41 [doi]
- Improved Modeling for Substitution Boxes with Negative Samples and BeyondDebranjan Pal, Anubhab Baksi, Surajit Mandal, Santanu Sarkar 0001. 45-69 [doi]
- Refined Linear Approximations for ARX Ciphers and Their Application to ChaChaYurie Okada, Atsuki Nagai, Atsuko Miyaji. 70-91 [doi]
- BOIL: Proof-Carrying Data from Accumulation of Correlated Holographic IOPsTohru Kohrita, Maksim Nikolaev, Javier Silva 0005. 95-118 [doi]
- Rejection-Free Framework of Zero-Knowledge Proof Based on Hint-MLWEAntoine Douteau, Adeline Roux-Langlois. 119-144 [doi]
- COMPASS: A Compact PASS-Lineage Accumulator with Succinct ProofsTao-hsiang Chang, Jen-Chieh Hsu, Hao-Yi Hsu, Raylin Tso, Masahiro Mambo. 145-169 [doi]
- Smooth Twins for Cryptographic Applications from Pell EquationsDaniel Berger. 173-193 [doi]
- Hardened CTIDH: Dummy-Free and Deterministic CTIDHGustavo Banegas, Andreas Hellenbrand, Matheus Saldanha. 194-215 [doi]
- Key-Updatable Identity-Based Signature SchemesTobias Guggemos, Farzin Renan. 216-238 [doi]
- Beyond Sequential Walks: Parallelizing the GA-Dlog ProblemSudeshna Karmakar, Abul Kalam, Santanu Sarkar 0001. 239-260 [doi]
- Multivariate Encryptions with LL' Perturbations - - Is it Possible to Repair HFE\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textrm{HFE}$$\end{document} in Encryption? When 0 Makes a Difference-Jacques Patarin, Pierre Varjabedian. 263-284 [doi]
- Efficient Identity-Based Inner Product Functional Encryption from RLWEAnushree Belel, Junji Shikata. 285-311 [doi]
- Module Lattice Based Constant-Size Group Signature with Verifier Local Revocation and Backward UnlinkabilityKomal Pursharthi, Dheerendra Mishra. 312-336 [doi]
- New Results in Quantum Analysis of LED: Featuring One and Two Oracle AttacksSiyi Wang, Kyungbae Jang, Anubhab Baksi, Sumanta Chakraborty, Wei Jie Bryan Lee, Anupam Chattopadhyay, Hwajeong Seo. 339-364 [doi]
- One-Time Memories Secure Against Depth-Bounded Quantum CircuitsKyosuke Sekii, Takashi Nishide. 365-389 [doi]
- Practically Implementable Minimal Universal Gate Sets for Multi-qudit Systems with Cryptographic ValidationAnisha Dutta, Sayantan Chakraborty, Chandan Goswami, Avishek Adhikari. 390-414 [doi]
- Traceable Bottom-Up Secret Sharing and Law and Order on Community Social Key RecoveryRittwik Hajra, Subha Kar, Pratyay Mukherjee, Soumit Pal. 417-441 [doi]
- Beyond Confidentiality: Framing-Resistant Secure Vault SchemesMeghna Sengupta. 442-460 [doi]