Abstract is missing.
- An Extension of Overbeck's Attack with an Application to Cryptanalysis of Twisted Gabidulin-Based SchemesAlain Couvreur, Ilaria Zappatore. 3-37 [doi]
- Cryptanalysis of Rank-Metric Schemes Based on Distorted Gabidulin CodesPierre Briaud, Pierre Loidreau. 38-56 [doi]
- A High-Performance Hardware Implementation of the LESS Digital Signature SchemeLuke Beckwith, Robert Wallace, Kamyar Mohajerani, Kris Gaj. 57-90 [doi]
- Wave Parameter SelectionNicolas Sendrier. 91-110 [doi]
- SPDH-Sign: Towards Efficient, Post-quantum Group-Based SignaturesChristopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti. 113-138 [doi]
- A Tightly Secure Identity-Based Signature Scheme from IsogeniesJiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata. 141-163 [doi]
- New NTRU Records with Improved Lattice BasesElena Kirshanova, Alexander May 0001, Julian Nowakowski. 167-195 [doi]
- On the Hardness of Scheme-Switching Between SIMD FHE SchemesKarim Eldefrawy, Nicholas Genise, Nathan Manohar. 196-224 [doi]
- Classical and Quantum 3 and 4-Sieves to Solve SVP with Low MemoryAndré Chailloux, Johanna Loyer. 225-255 [doi]
- NTRU in Quaternion Algebras of Bounded DiscriminantCong Ling 0001, Andrew Mendelsohn. 256-290 [doi]
- Do Not Bound to a Single Position: Near-Optimal Multi-positional Mismatch Attacks Against Kyber and SaberQian Guo 0001, Erik Mårtensson. 291-320 [doi]
- NTWE: A Natural Combination of NTRU and LWEJoel Gärtner. 321-353 [doi]
- Fast Enumeration Algorithm for Multivariate Polynomials over General Finite FieldsHiroki Furue, Tsuyoshi Takagi. 357-378 [doi]
- DME: A Full Encryption, Signature and KEM Multivariate Public Key CryptosystemIgnacio Luengo, Martin E. Avendano, Pilar Coscojuela. 379-402 [doi]
- On the Quantum Security of HAWKSerge Fehr, Yu-Hsuan Huang. 405-416 [doi]
- Non-Observable Quantum Random Oracle ModelNavid Alamati, Varun Maram, Daniel Masny. 417-444 [doi]
- Characterizing the qIND-qCPA (In)security of the CBC, CFB, OFB and CTR Modes of OperationTristan Nemoz, Zoé Amblard, Aurélien Dupin. 445-475 [doi]
- Breaking the Quadratic Barrier: Quantum Cryptanalysis of Milenage, Telecommunications' Cryptographic BackboneVincent Quentin Ulitzsch, Jean-Pierre Seifert. 476-504 [doi]
- Time and Query Complexity Tradeoffs for the Dihedral Coset ProblemMaxime Remaud, André Schrottenloher, Jean-Pierre Tillich. 505-532 [doi]
- Post-Quantum Signatures in DNSSEC via Request-Based FragmentationJason Goertzen, Douglas Stebila. 535-564 [doi]
- Hash-Based Direct Anonymous AttestationLiqun Chen 0002, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang. 565-600 [doi]
- Muckle+: End-to-End Hybrid Authenticated Key ExchangesSonja Bruckner, Sebastian Ramacher, Christoph Striecks. 601-633 [doi]
- WrapQ: Side-Channel Secure Key Management for Post-quantum CryptographyMarkku-Juhani O. Saarinen. 637-657 [doi]
- + SignaturesAlexander Wagner, Vera Wesselkamp, Felix Oberhansl, Marc Schink, Emanuele Strieder. 658-687 [doi]
- Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in HardwareHauke Malte Steffen, Georg Land, Lucie Johanna Kogelheide, Tim Güneysu. 688-711 [doi]