Abstract is missing.
- Tight Bounds for Simon's AlgorithmXavier Bonnetain. 3-23 [doi]
- Constructions for Quantum Indistinguishability ObfuscationAnne Broadbent, Raza Ali Kazmi. 24-43 [doi]
- +-Haraka Signatures on a Fault-Tolerant Quantum ComputerRobin M. Berger, Marcel Tiepelt. 44-63 [doi]
- Post-quantum Key-Blinding for Authentication in Anonymity NetworksEdward Eaton, Douglas Stebila, Roy Stracovsky. 67-87 [doi]
- Implementing and Measuring KEMTLSSofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood. 88-107 [doi]
- A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC CandidatesMojtaba Bisheh Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani. 108-126 [doi]
- Attribute-Based Access Control for Inner Product Functional Encryption from LWETapas Pal, Ratna Dutta. 127-148 [doi]
- Classical Attacks on a Variant of the RSA CryptosystemAbderrahmane Nitaj, Muhammad Rezal Bin Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu. 151-167 [doi]
- Improved Attacks Against Key Reuse in Learning with Errors Key ExchangeNina Bindel, Douglas Stebila, Shannon Veitch. 168-188 [doi]
- Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential CryptanalysisTarun Yadav, Manoj Kumar. 191-212 [doi]
- Train or Adapt a Deeply Learned Profile?Christophe Genevey-Metat, Annelie Heuser, Benoît Gérard. 213-232 [doi]
- Autocorrelations of Vectorial Boolean FunctionsAnne Canteaut, Lukas Kölsch, Chao Li 0002, Chunlei Li 0001, Kangquan Li, Longjiang Qu, Friedrich Wiemer. 233-253 [doi]
- Automatic Search for Bit-Based Division PropertyShibam Ghosh, Orr Dunkelman. 254-274 [doi]
- TEDT2 - Highly Secure Leakage-Resilient TBC-Based Authenticated EncryptionEik List. 275-295 [doi]
- Weight-Based Nakamoto-Style BlockchainsSimon Holmgaard Kamp, Bernardo Magri, Christian Matt 0002, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi. 299-319 [doi]
- LOVE a PairingDiego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez. 320-340 [doi]
- Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoTooAlejandro Hevia, Ilana Mergudich-Thal. 341-362 [doi]
- Stronger Notions and a More Efficient Construction of Threshold Ring SignaturesAlexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov. 363-381 [doi]
- Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS IsomorphismsDiego F. Aranha, Anders P. K. Dalskov, Daniel Escudero 0001, Claudio Orlandi. 382-404 [doi]
- Full-Threshold Actively-Secure Multiparty Arithmetic Circuit GarblingEleftheria Makri, Tim Wood 0003. 407-430 [doi]
- The Cost of IEEE Arithmetic in Secure ComputationDavid W. Archer, Shahla Atapoor, Nigel P. Smart. 431-452 [doi]
- Honest Majority MPC with Abort with Minimal Online CommunicationAnders P. K. Dalskov, Daniel Escudero 0001. 453-472 [doi]