Abstract is missing.
- Looking Back - My Life as a Mathematician and CryptographerDouglas R. Stinson. 3-20 [doi]
- Supersingular Isogeny Key Exchange for BeginnersCraig Costello. 21-50 [doi]
- Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AESLorenzo Grassi 0001. 53-84 [doi]
- Iterative Differential Characteristic of TRIFLE-BCFukang Liu, Takanori Isobe 0001. 85-100 [doi]
- Plaintext Recovery Attacks Against XTS Beyond CollisionsTakanori Isobe 0001, Kazuhiko Minematsu. 103-123 [doi]
- Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis CompetitionPatrick Derbez, Virginie Lallemand, Aleksei Udovenko. 124-145 [doi]
- Algebraic Cryptanalysis of Variants of FritChristoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger. 149-170 [doi]
- Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic DegreeChaoyun Li, Bart Preneel. 171-193 [doi]
- A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key SchedulesJung-Keun Lee, Bonwook Koo, Woo-Hwan Kim. 194-224 [doi]
- Towards a Practical Cluster Analysis over Encrypted DataJung Hee Cheon, Duhyeong Kim, Jai Hyun Park. 227-249 [doi]
- Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve AttackEli Biham, Lior Neumann. 250-273 [doi]
- Using TopGear in Overdrive: A More Efficient ZKPoK for SPDZCarsten Baum, Daniele Cozzo, Nigel P. Smart. 274-302 [doi]
- On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random FunctionsTibor Jager, David Niehues. 303-332 [doi]
- Tight Security Bounds for Generic Stream Cipher ConstructionsMatthias Hamann, Matthias Krause 0001, Alexander Moch. 335-364 [doi]
- On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and PlantletYosuke Todo, Willi Meier, Kazumaro Aoki. 365-392 [doi]
- A Lightweight Alternative to PMACKazuhiko Minematsu. 393-417 [doi]
- An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation AttacksAkifumi Muroi, Shinya Okumura, Atsuko Miyaji. 421-436 [doi]
- Ternary Syndrome Decoding with Large WeightRémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne. 437-466 [doi]
- Exploring Trade-offs in Batch Bounded Distance DecodingMartin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer. 467-491 [doi]
- On Quantum Slide AttacksXavier Bonnetain, María Naya-Plasencia, André Schrottenloher. 492-519 [doi]
- XMSS and Embedded SystemsWen Wang 0007, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta 0001, Jakub Szefer, Ruben Niederhagen. 523-550 [doi]
- A Timing Attack on the HQC Encryption SchemeThales Bandiera Paiva, Routo Terada. 551-573 [doi]
- Block-Anti-Circulant Unbalanced Oil and VinegarAlan Szepieniec, Bart Preneel. 574-588 [doi]
- A DFA Attack on White-Box Implementations of AES with External EncodingsAlessandro Amadori, Wil Michiels, Peter Roelse. 591-617 [doi]
- Parallelizable Authenticated Encryption with Small State SizeAkiko Inoue, Kazuhiko Minematsu. 618-644 [doi]
- Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key RecoveryBenjamin Hettwer, Stefan Gehrer, Tim Güneysu. 645-666 [doi]
- BBQ: Using AES in Picnic SignaturesCyprien Delpech de Saint Guilhem, Lauren De Meyer, Emmanuela Orsini, Nigel P. Smart. 669-692 [doi]
- Towards Practical GGM-Based PRF from (Module-)Learning-with-RoundingChitchanok Chuengsatiansup, Damien Stehlé. 693-713 [doi]