Accepted papers
- CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives – Emanuele Bellini, David Gerault, Juan Grados, Yun Ju Huang, Rusydi Makarim, Mohamed Rachidi and Sharwan Tiwari • pre-proceeding version (PDF)
- Mask Compression: High-Order Masking on Memory-Constrained Devices – Markku-Juhani Saarinen and Mélissa Rossi • pre-proceeding version (PDF)
- SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits – Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong and MinJune Yi • pre-proceeding version (PDF)
- A Post-Quantum Round-Optimal Oblivious PRF from Isogenies – Andrea Basso • pre-proceeding version (PDF)
- Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications – Kosei Sakamoto, Ryoma Ito and Takanori Isobe • pre-proceeding version (PDF)
- The Random Fault Model – Siemen Dhooghe and Svetla Nikova • pre-proceeding version (PDF)
- Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme – Lichao Wu, Guilherme Perin and Stjepan Picek • pre-proceeding version (PDF)
- Generalized Implicit Factorization Problem – Yansong Feng, Abderrahmane Nitaj and Yanbin Pan • pre-proceeding version (PDF)
- On the Precision Loss in Approximate Homomorphic Encryption – Anamaria Costache, Benjamin Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie and Rachel Player • pre-proceeding version (PDF)
- More Balanced Polynomials: Cube Attacks on 810- and 825- Round of Trivium with Practical Complexity – Hao Lei, Jiahui He, Kai Hu and Meiqin Wang • pre-proceeding version (PDF)
- Probabilistic Related-Key Statistical Saturation Cryptanalysis – Muzhou Li, Nicky Mouha, Ling Sun and Meiqin Wang • pre-proceeding version (PDF)
- Fast and Efficient Hardware Implementation of HQC – Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz and Jakub Szefer • pre-proceeding version (PDF)
- Threshold Implementations with Non-Uniform Inputs – Siemen Dhooghe and Artemii Ovchinnikov • pre-proceeding version (PDF)
- Bit Security Analysis of Lattice-Based KEMs under Plaintext-Checking Attacks – Ruiqi Mi, Haodong Jiang and Zhenfeng Zhang • pre-proceeding version (PDF)
- A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH – Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun and Willi Meier • pre-proceeding version (PDF)
- Improving the Rectangle Attack on GIFT-64 – Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang and Zhuohui Feng • pre-proceeding version (PDF)
- Secure Function Extensions to Additively Homomorphic Cryptosystems – Mounika Pratapa and Aleksander Essex • pre-proceeding version (PDF)
- Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery – Melanie Jauch and Varun Maram • pre-proceeding version (PDF)
- Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant – Wei Wei, Min Luo, Zijian Bao, Cong Peng and Debiao He • pre-proceeding version (PDF)
- Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher – Shoichi Hirose and Kazuhiko Minematsu • pre-proceeding version (PDF)
- Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon – Amirhossein Ebrahimi Moghaddam, David Gerault and Paolo Palmieri • pre-proceeding version (PDF)