Abstract is missing.
- On Evaluating Anonymity of Onion RoutingAlessandro Melloni, Martijn Stam, Øyvind Ytrehus. 3-24 [doi]
- Revisiting Driver Anonymity in ORideDeepak Kumaraswamy, Shyam Murthy, Srinivas Vivek 0001. 25-46 [doi]
- The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its ApplicationKeita Xagawa. 47-67 [doi]
- ZKAttest: Ring and Group Signatures for Existing ECDSA KeysArmando Faz-Hernández, Watson Ladd, Deepak Maram. 68-83 [doi]
- A Low-Randomness Second-Order Masked AESTim Beyne, Siemen Dhooghe, Adrián Ranea, Danilo Sijacic. 87-110 [doi]
- How Do the Arbiter PUFs Sample the Boolean Function Class?Animesh Roy 0004, Dibyendu Roy 0001, Subhamoy Maitra. 111-130 [doi]
- 2 Access Structures over Rings and FieldsRobin Jadoul, Nigel P. Smart, Barry Van Leeuwen. 131-151 [doi]
- Multi-user Security of the Elephant v2 Authenticated Encryption ModeTim Beyne, Yu Long Chen, Christoph Dobraunig, Bart Mennink. 155-178 [doi]
- Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XORYosuke Todo, Yu Sasaki. 179-199 [doi]
- Parallel Verification of Serial MAC and AE ModesKazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo. 200-219 [doi]
- Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAESChao Niu, Muzhou Li, Meiqin Wang, Qingju Wang 0001, Siu-Ming Yiu. 223-245 [doi]
- Improved Attacks on GIFT-64Ling Sun 0001, Wei Wang, Meiqin Wang. 246-265 [doi]
- A Simpler Model for Recovering Superpoly on TriviumStéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme. 266-285 [doi]
- Automated Truncation of Differential Trails and Trail Clustering in ARXAlex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto. 286-307 [doi]
- Improved Quantum Algorithms for the k-XOR ProblemAndré Schrottenloher. 311-331 [doi]
- Quantum Boomerang Attacks and Some ApplicationsPaul Frixons, María Naya-Plasencia, André Schrottenloher. 332-352 [doi]
- MAYO: Practical Post-quantum Signatures from Oil-and-Vinegar MapsWard Beullens. 355-376 [doi]
- Simple and Memory-Efficient Signature Generation of $\mathrm {XMSS^{MT}}$Haruhisa Kosuge, Hidema Tanaka. 377-397 [doi]
- Zaytun: Lattice Based PKE and KEM with Shorter Ciphertext SizeParhat Abla, Mingsheng Wang. 398-418 [doi]
- A Polynomial Time Key-Recovery Attack on the Sidon CryptosystemPierre Briaud, Jean-Pierre Tillich, Javier A. Verbel. 419-438 [doi]
- Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDFJorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi. 441-460 [doi]
- Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular IsogeniesEdward Eaton, David Jao, Chelsea Komlo, Youcef Mokrani. 461-482 [doi]
- Secret Keys in Genus-2 SIDHSabrina Kunzweiler, Yan Bo Ti, Charlotte Weitkämper. 483-507 [doi]