Abstract is missing.
- Preimage-Type Attacks for Reduced Ascon-Hash: Application to Ed25519Marcel Nageler, Lorenz Schmid, Maria Eichlseder. 3-25 [doi]
- Collision Attacks on SPONGENT with Grouping MethodKeita Toyama, Kosei Sakamoto, Takanori Isobe 0001. 26-54 [doi]
- Practical Collision Attacks on Reduced-Round Xoodyak Hash ModeHuina Li, Le He, Weidong Qiu. 55-78 [doi]
- Breaking the Twinkle Authenticated Encryption Scheme and Analyzing Its Underlying PermutationDebasmita Chakraborty, Hosein Hadipour, Anup Kumar Kundu, Mostafizar Rahman, Prathamesh Ram, Yu Sasaki, Dilip Sau, Aman Sinha. 79-109 [doi]
- Minimalist Model for Impossible DifferentialsPatrick Derbez, Marie Euler. 113-143 [doi]
- Impossible Differentials Automation: Model Generation and New TechniquesEmanuele Bellini 0002, Alessandro De Piccoli, David Gérault, Paul Huynh, Simone Pelizzola, Andrea Visconti. 144-175 [doi]
- Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM ProofsElena Andreeva 0001, Amit Singh Bhati, Andreas Weninger. 179-208 [doi]
- Blockcipher-Based Key Commitment for Nonce-Derived SchemesPanos Kampanakis, Shai Halevi, Nevine Maurice Ebeid, Matt Campagna. 209-234 [doi]
- The Revisited Hidden Weight Bit FunctionPierrick Méaux, Tim Seuré, Deng Tang. 235-263 [doi]
- Bit Security of Quantum Key SearchMarc Fischlin, Evangelos Gkoumas. 264-290 [doi]
- High-Throughput EdDSA Verification on Intel Processors with Advanced Vector ExtensionsBowen Zhang, Hao Cheng 0009, Johann Großschädl, Peter Y. A. Ryan. 293-314 [doi]
- Air-FRI: Acceleration of the FRI Protocol on the GPU for ZkSNARK ApplicationsTanmayi Jandhyala, Guang Gong. 315-338 [doi]
- Accelerating Post-quantum Secure zkSNARKs by Optimizing Additive FFTMohammadTaghi Badakhshan, Susanta Samanta, Guang Gong. 339-368 [doi]
- Multi-precision PMNS with CIOS ReductionNicolas Méloni, François Palma, Pascal Véron. 369-390 [doi]
- Unified MEDS AcceleratorSanjay Deshpande, Yongseok Lee, Mamuri Nawan, Kashif Nawaz, Ruben Niederhagen, Yunheung Paek, Jakub Szefer. 391-421 [doi]
- Bounded CCA2-Secure Proxy Re-encryption from LatticesShingo Sato, Junji Shikata. 425-455 [doi]
- Public-Key Encryption and Injective Trapdoor Functions from LWE with Large Noise RateLiheng Ji, Yilei Chen. 456-485 [doi]
- AI for Code-based CryptographyMohamed Malhou, Ludovic Perret, Kristin E. Lauter. 489-518 [doi]
- Practical Attack on All Parameters of the HPPC Signature SchemePierre Briaud, Maxime Bros, Ray A. Perlner, Daniel Smith-Tone. 519-538 [doi]
- Algebraic Key-Recovery Side-Channel Attack on Classic McElieceMichaël Bulois, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Vincent Grosso. 539-566 [doi]
- An Attack on ML-DSA Using an Implicit HintPaco Azevedo Oliveira, Jordan Beraud, Louis Goubin. 567-585 [doi]
- How (not) to Build Identity-Based Encryption from IsogeniesElif Ozbay Gurler, Patrick Struck. 589-615 [doi]
- PIsignHD: A New Structure for the SQIsign Family with Flexible ApplicabilityKaizhan Lin, Weize Wang, Chang-An Zhao, Yunlei Zhao. 616-644 [doi]
- Downlink (T)FHE Ciphertexts CompressionAntonina Bondarchuk, Olive Chakraborty, Geoffroy Couteau, Renaud Sirdey. 647-678 [doi]
- Efficient Full Domain Functional Bootstrapping from Recursive LUT DecompositionIntak Hwang, Shinwon Lee, Seonhong Min, Yongsoo Song. 679-699 [doi]
- Picking up the Fallen Mask: Breaking and Fixing the RS-Mask CountermeasureDilara Toprakhisar, Svetla Nikova, Ventzislav Nikov. 703-723 [doi]
- Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-Channel AnalysisSengim Karayalcin, Guilherme Perin, Stjepan Picek. 724-752 [doi]
- Efficient SPA Countermeasures Using Redundant Number Representation with Application to ML-KEMRishub Nagpal, Vedad Hadzic, Robert Primas, Stefan Mangard. 753-780 [doi]
- Secret in OnePiece: Single-Bit Fault Attack on KyberJian Wang 0136, Weiqiong Cao, Hua Chen 0011, Haoyuan Li. 781-804 [doi]