Abstract is missing.
- Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic TransformsHanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang. 3-23 [doi]
- On Linear Complexity of Finite Sequences: Coding Theory and Applications to CryptographyEdoardo Persichetti, Tovohery Randrianarisoa. 24-44 [doi]
- Methods of Extracting Parameters of the Processor CachesSihao Shen, Zhenzhen Li, Wei Song 0002. 47-65 [doi]
- KDPM: Kernel Data Protection Mechanism Using a Memory Protection KeyHiroki Kuzuno, Toshihiro Yamauchi. 66-84 [doi]
- CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCsShota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi. 85-104 [doi]
- Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key SizesFerdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, Kan Yasuda. 107-127 [doi]
- Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption OraclesTakanori Daiza, Kazuki Yoneyama. 128-144 [doi]
- Improving Fault Attacks on Rainbow with Fixing Random Vinegar ValuesTaku Kato, Yutaro Kiyomura, Tsuyoshi Takagi. 147-165 [doi]
- Quantum-Resistant 1-out-of-N Oblivious Signatures from LatticesJing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo. 166-186 [doi]
- On Extension of Evaluation Algorithms in Keyed-Homomorphic EncryptionHirotomo Shinoki, Koji Nuida. 189-207 [doi]
- Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC ProtocolsNariyasu Heseri, Koji Nuida. 208-223 [doi]
- Card-Based Secure Sorting ProtocolRikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Yu-ichi Hayashi, Takaaki Mizuki. 224-240 [doi]