Abstract is missing.
- Profiling Side-Channel Attacks on Dilithium - A Small Bit-Fiddling Leak Breaks It AllVincent Quentin Ulitzsch, Soundes Marzougui, Mehdi Tibouchi, Jean-Pierre Seifert. 3-32 [doi]
- On the Weakness of Ring-LWE mod Prime Ideal $\mathfrak {q}$ by Trace MapTomoka Takahashi, Shinya Okumura, Atsuko Miyaji. 33-52 [doi]
- 2DT-GLS: Faster and Exception-Free Scalar Multiplication in the GLS254 Binary CurveMarius A. Aardal, Diego F. Aranha. 53-74 [doi]
- Key-Recovery Attacks on CRAFT and WARPLing Sun 0001, Wei Wang, Meiqin Wang. 77-95 [doi]
- Differential Analysis of the Ternary Hash Function TroikaChristina Boura, Margot Funk, Yann Rotella. 96-115 [doi]
- Another Look at Differential-Linear AttacksOrr Dunkelman, Ariel Weizman. 116-136 [doi]
- Injective Rank Metric Trapdoor Functions with Homogeneous ErrorsÉtienne Burle, Philippe Gaborit, Younes Hatri, Ayoub Otmani. 139-158 [doi]
- sfPERKS: Persistent and Distributed Key Acquisition for Secure Storage from PasswordsGareth T. Davies, Jeroen Pijnenburg. 159-189 [doi]
- Improved Circuit-Based PSI via Equality Preserving CompressionKyoohyung Han, Dukjae Moon, Yongha Son. 190-209 [doi]
- Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 ChallengeAleksei Udovenko, Giuseppe Vitto. 213-233 [doi]
- Patient Zero & Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKEFabio Campos, Michael Meyer 0001, Krijn Reijnders, Marc Stöttinger. 234-262 [doi]
- An Effective Lower Bound on the Number of Orientable Supersingular Elliptic CurvesAntonin Leroux. 263-281 [doi]
- Finding All Impossible Differentials When Considering the DDTKai Hu 0001, Thomas Peyrin, Meiqin Wang. 285-305 [doi]
- A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext PairLulu Zhang, Meicheng Liu, Dongdai Lin. 306-327 [doi]
- Collision-Based Attacks on White-Box Implementations of the AES Block CipherJiqiang Lu, MingXue Wang, Can Wang, Chen Yang. 328-352 [doi]
- Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATANAlex Biryukov, Je Sen Teh, Aleksei Udovenko. 355-375 [doi]
- Improved the Automated Evaluation Algorithm Against Differential Attacks and Its Application to WARPJiali Shi, Guoqiang Liu, Chao Li. 376-396 [doi]
- Faster Cryptographic Hash Function from Supersingular Isogeny GraphsJavad Doliskani, Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto. 399-415 [doi]
- From Plaintext-Extractability to IND-CCA SecurityEhsan Ebrahimi. 419-436 [doi]
- Farasha: A Provable Permutation-Based Parallelizable PRFNajwa Aaraj, Emanuele Bellini 0002, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit 0001, Eugenio Salazar. 437-458 [doi]
- A Sponge-Based PRF with Good Multi-user SecurityArghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi. 459-478 [doi]