Abstract is missing.
- Efficient Lattice-Based Polynomial Evaluation and Batch ZK ArgumentsVeronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu. 3-33 [doi]
- FROST: Flexible Round-Optimized Schnorr Threshold SignaturesChelsea Komlo, Ian Goldberg. 34-65 [doi]
- Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAMJonathan Takeshita, Dayane Reis, Ting Gong, Michael T. Niemier, X. Sharon Hu, Taeho Jung. 66-89 [doi]
- Obfuscating Finite AutomataSteven D. Galbraith, Lukas Zobernig. 90-114 [doi]
- On Index Calculus Algorithms for Subfield CurvesSteven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit. 115-138 [doi]
- Weak-Key Distinguishers for AESLorenzo Grassi 0001, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer. 141-170 [doi]
- Algebraic Key-Recovery Attacks on Reduced-Round XoofffTingting Cui, Lorenzo Grassi 0001. 171-197 [doi]
- Improved (Related-key) Differential Cryptanalysis on GIFTFulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding. 198-228 [doi]
- Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPathJohn Petter Indrøy, Nicolas Costes, Håvard Raddum. 229-251 [doi]
- Boolean Ring Cryptographic Equation SolvingSean Murphy, Maura B. Paterson, Christine Swart. 252-272 [doi]
- Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round FunctionsArnab Roy 0005, Elena Andreeva 0001, Jan Ferdinand Sauer. 273-300 [doi]
- Unintended Features of APIs: Cryptanalysis of Incremental HMACGal Benmocha, Eli Biham, Stav Perle. 301-325 [doi]
- Low-Gate Quantum Golden Collision FindingSamuel Jaques, André Schrottenloher. 329-359 [doi]
- Improvements to Quantum Search Techniques for Block-Ciphers, with Applications to AESJames H. Davenport, Benjamin Pring. 360-384 [doi]
- Not Enough LESS: An Improved Algorithm for Solving Code Equivalence Problems over $\mathbb {F}_q$Ward Beullens. 387-403 [doi]
- Towards Post-Quantum Security for Signal's X3DH HandshakeJacqueline Brendel, Marc Fischlin, Felix Günther 0001, Christian Janson, Douglas Stebila. 404-430 [doi]
- Trapdoor DDH Groups from Pairings and IsogeniesPéter Kutas, Christophe Petit, Javier Silva 0001. 431-450 [doi]
- Practical Isogeny-Based Key-Exchange with Optimal TightnessBor de Kock, Kristian Gjøsteen, Mattia Veroni. 451-479 [doi]
- PRINCEv2 - More Security for (Almost) No OverheadDusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer. 483-511 [doi]
- Nonce-Misuse Security of the SAEF Authenticated Encryption ModeElena Andreeva 0001, Amit Singh Bhati, Damian Vizár. 512-534 [doi]
- WARP : Revisiting GFN for Lightweight 128-Bit Block CipherSubhadeep Banik, Zhenzhen Bao, Takanori Isobe 0001, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri. 535-564 [doi]
- Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel EvaluationsAron Gohr, Sven Jacob, Werner Schindler. 567-592 [doi]
- Correlation Power Analysis and Higher-Order Masking Implementation of WAGEYunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit 0001, Tianhong Xu, Yunjie Yi, Nusa Zidaric. 593-614 [doi]
- On the Influence of Optimizers in Deep Learning-Based Side-Channel AnalysisGuilherme Perin, Stjepan Picek. 615-636 [doi]
- On Self-equivalence Encodings in White-Box ImplementationsAdrián Ranea, Bart Preneel. 639-669 [doi]
- Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-VotingAshley Fraser, Elizabeth A. Quaglia. 670-697 [doi]
- High-Throughput Elliptic Curve Cryptography Using AVX2 Vector InstructionsHao Cheng 0009, Johann Großschädl, Jiaqi Tian, Peter B. Rønne, Peter Y. A. Ryan. 698-719 [doi]