Abstract is missing.
- Second Order Statistical Behavior of LLL and BKZYang Yu, Léo Ducas. 3-22 [doi]
- Refinement of the Four-Dimensional GLV Method on Elliptic CurvesHairong Yi, Yuqing Zhu, Dongdai Lin. 23-42 [doi]
- Post-Quantum Static-Static Key Agreement Using Multiple Protocol InstancesReza Azarderakhsh, David Jao, Christopher Leonardi. 45-63 [doi]
- Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-HellmanBrian Koziel, Reza Azarderakhsh, David Jao. 64-81 [doi]
- 6Laurent Grémy, Aurore Guillevic, François Morain, Emmanuel Thomé. 85-105 [doi]
- Computing Low-Weight Discrete LogarithmsBailey Kacsmar, Sarah Plosker, Ryan Henry. 106-126 [doi]
- sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic PrimitivesRiham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong. 129-150 [doi]
- Efficient Reductions in Cyclotomic Rings - Application to Ring-LWE Based FHE SchemesJean-Claude Bajard, Julien Eynard, M. Anwar Hasan, Paulo Martins, Leonel Sousa, Vincent Zucca. 151-171 [doi]
- How to (Pre-)Compute a Ladder - Improving the Performance of X25519 and X448Thomaz Oliveira, Julio López, Hüseyin Hisil, Armando Faz-Hernández, Francisco Rodríguez-Henríquez. 172-191 [doi]
- HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE EncryptionMarkku-Juhani O. Saarinen. 192-212 [doi]
- A Public-Key Encryption Scheme Based on Non-linear Indeterminate EquationsKoichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka. 215-234 [doi]
- NTRU Prime: Reducing Attack Surface at Low CostDaniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange 0001, Christine van Vredendaal. 235-260 [doi]
- Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle ModelEdward Eaton. 263-280 [doi]
- Efficient Post-Quantum Undeniable Signature on 64-Bit ARMAmir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani. 281-298 [doi]
- "Oops, I Did It Again" - Security of One-Time Signatures Under Two-Message AttacksLeon Groot Bruinderink, Andreas Hülsing. 299-322 [doi]
- Low-Communication Parallel Quantum Multi-Target Preimage SearchGustavo Banegas, Daniel J. Bernstein. 325-335 [doi]
- Lattice Klepto - Turning Post-Quantum Crypto Against ItselfRobin Kwant, Tanja Lange 0001, Kimberley Thissen. 336-354 [doi]
- Total Break of the SRP Encryption SchemeRay A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone. 355-373 [doi]
- K)Jean-François Biasse. 374-393 [doi]
- Quantum Key-Recovery on Full AEZXavier Bonnetain. 394-406 [doi]
- Quantum Key Search with Side Channel AdviceDaniel P. Martin 0001, Ashley Montanaro, Elisabeth Oswald, Daniel James Shepherd. 407-422 [doi]
- Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round SPARX-128Mohamed Tolba, Ahmed Abdelkhalek 0001, Amr M. Youssef. 423-441 [doi]
- Categorising and Comparing Cluster-Based DPA DistinguishersXinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang. 442-458 [doi]