Abstract is missing.
- More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical ComplexitiesHao Lei, Jiahui He, Kai Hu 0001, Meiqin Wang. 3-21 [doi]
- A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASHXiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier. 22-42 [doi]
- Improving the Rectangle Attack on GIFT-64Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song 0001, Qianqian Yang 0003, Zhuohui Feng. 43-61 [doi]
- Mask Compression: High-Order Masking on Memory-Constrained DevicesMarkku-Juhani O. Saarinen, Mélissa Rossi. 65-81 [doi]
- Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking SchemeLichao Wu, Guilherme Perin, Stjepan Picek. 82-96 [doi]
- Threshold Implementations with Non-uniform InputsSiemen Dhooghe, Artemii Ovchinnikov. 97-123 [doi]
- SMAUG: Pushing Lattice-Based Key Encapsulation Mechanisms to the LimitsJung Hee Cheon, Hyeongmin Choe, Dongyeon Hong, MinJune Yi. 127-146 [doi]
- A Post-Quantum Round-Optimal Oblivious PRF from IsogeniesAndrea Basso 0002. 147-168 [doi]
- Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum ResistantWei Wei, Min Luo 0002, Zijian Bao, Cong Peng 0005, Debiao He. 169-188 [doi]
- The Random Fault ModelSiemen Dhooghe, Svetla Nikova. 191-212 [doi]
- Probabilistic Related-Key Statistical Saturation CryptanalysisMuzhou Li, Nicky Mouha, Ling Sun 0001, Meiqin Wang. 213-232 [doi]
- Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block CipherShoichi Hirose, Kazuhiko Minematsu. 233-252 [doi]
- Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking AttacksRuiqi Mi, Haodong Jiang, Zhenfeng Zhang. 255-274 [doi]
- Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-RecoveryMelanie Jauch, Varun Maram. 275-296 [doi]
- Fast and Efficient Hardware Implementation of HQCSanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz, Jakub Szefer. 297-321 [doi]
- On the Precision Loss in Approximate Homomorphic EncryptionAnamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, Rachel Player. 325-345 [doi]
- Secure Function Extensions to Additively Homomorphic CryptosystemsMounika Pratapa, Aleksander Essex. 346-366 [doi]
- Generalized Implicit Factorization ProblemYansong Feng 0001, Abderrahmane Nitaj, Yanbin Pan. 369-384 [doi]
- CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric PrimitivesEmanuele Bellini 0002, David Gérault, Juan Grados 0002, Yun-Ju Huang, Rusydi H. Makarim, Mohamed Rachidi, Sharwan K. Tiwari. 387-408 [doi]
- Parallel SAT Framework to Find Clustering of Differential Characteristics and Its ApplicationsKosei Sakamoto, Ryoma Ito 0001, Takanori Isobe 0001. 409-428 [doi]
- Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and SimonAmirhossein Ebrahimi, David Gérault, Paolo Palmieri 0001. 429-450 [doi]