Abstract is missing.
- Decoding Supercodes of Gabidulin Codes and Applications to CryptanalysisMaxime Bombar, Alain Couvreur. 3-22 [doi]
- LESS-FM: Fine-Tuning Signatures from the Code Equivalence ProblemAlessandro Barenghi, Jean-François Biasse, Edoardo Persichetti, Paolo Santini. 23-43 [doi]
- Classical and Quantum Algorithms for Generic Syndrome Decoding Problems and Applications to the Lee MetricAndré Chailloux, Thomas Debris-Alazard, Simona Etinski. 44-62 [doi]
- Improving Thomae-Wolf Algorithm for Solving Underdetermined Multivariate Quadratic Polynomial ProblemHiroki Furue, Shuhei Nakamura, Tsuyoshi Takagi. 65-78 [doi]
- New Practical Multivariate Signatures from a Nonlinear ModifierDaniel Smith-Tone. 79-97 [doi]
- On the Effect of Projection on Rank Attacks in Multivariate CryptographyMorten Øygarden, Daniel Smith-Tone, Javier A. Verbel. 98-113 [doi]
- Quantum Key Search for Ternary LWEIggy van Hoof, Elena Kirshanova, Alexander May 0001. 117-132 [doi]
- A Fusion Algorithm for Solving the Hidden Shift Problem in Finite Abelian GroupsWouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens. 133-153 [doi]
- The "Quantum Annoying" Property of Password-Authenticated Key Exchange ProtocolsEdward Eaton, Douglas Stebila. 154-173 [doi]
- Differential Power Analysis of the Picnic Signature SchemeTim Gellersen, Okan Seker, Thomas Eisenbarth 0001. 177-194 [doi]
- Implementation of Lattice Trapdoors on Modules and ApplicationsPauline Bert, Gautier Eberhart, Lucas Prabel, Adeline Roux-Langlois, Mohamed Sabt. 195-214 [doi]
- Verifying Post-Quantum Signatures in 8 kB of RAMRuben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange 0001, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang. 215-233 [doi]
- Fast NEON-Based Multiplication for Lattice-Based NIST Post-quantum Cryptography FinalistsDuc Tri Nguyen, Kris Gaj. 234-254 [doi]
- CSI-RAShi: Distributed Key Generation for CSIDHWard Beullens, Lucas Disson, Robi Pedersen, Frederik Vercauteren. 257-276 [doi]
- SimS: A Simplification of SiGamalTako Boris Fouotsa, Christophe Petit. 277-295 [doi]
- Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKEAaron Hutchinson, Koray Karabina, Geovandro Pereira. 296-315 [doi]
- Generating Cryptographically-Strong Random Lattice Bases and Recognizing Rotations of $\mathbb {Z}^n$Tamar Lichter Blanks, Stephen D. Miller. 319-338 [doi]
- Zero-Knowledge Proofs for Committed Symmetric Boolean FunctionsSan Ling, Khoa Nguyen, Duong Hieu Phan, Hanh Tang, Huaxiong Wang. 339-359 [doi]
- Short Identity-Based Signatures with Tight Security from LatticesJiaxin Pan, Benedikt Wagner. 360-379 [doi]
- On Removing Rejection Conditions in Practical Lattice-Based SignaturesRouzbeh Behnia, Yilei Chen, Daniel Masny. 380-398 [doi]
- Secure Hybrid Encryption in the Standard Model from Hard Learning ProblemsXavier Boyen, Malika Izabachène, Qinyi Li. 399-418 [doi]
- Attacks on Beyond-Birthday-Bound MACs in the Quantum SettingTingting Guo, Peng Wang 0009, Lei Hu, Dingfeng Ye. 421-441 [doi]
- An Algebraic Approach to the Rank Support Learning ProblemMagali Bardet, Pierre Briaud. 442-462 [doi]
- Quantum Indistinguishability for Public Key EncryptionTommaso Gagliardoni, Juliane Krämer, Patrick Struck. 463-482 [doi]
- A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) CryptosystemPrastudy Fauzi, Martha Norberg Hovd, Håvard Raddum. 483-498 [doi]