Accepted papers
-
CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives – Emanuele Bellini, David Gerault, Juan Grados, Yun Ju Huang, Rusydi Makarim, Mohamed Rachidi and Sharwan Tiwari
-
Mask Compression: High-Order Masking on Memory-Constrained Devices – Markku-Juhani Saarinen and Mélissa Rossi
-
SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits – Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong and MinJune Yi
-
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies – Andrea Basso
-
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications – Kosei Sakamoto, Ryoma Ito and Takanori Isobe
-
The Random Fault Model – Siemen Dhooghe and Svetla Nikova
-
Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme – Lichao Wu, Guilherme Perin and Stjepan Picek
-
Generalized Implicit Factorization Problem – Yansong Feng, Abderrahmane Nitaj and Yanbin Pan
-
On the Precision Loss in Approximate Homomorphic Encryption – Anamaria Costache, Benjamin Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie and Rachel Player
-
More Balanced Polynomials: Cube Attacks on 810- and 825- Round of Trivium with Practical Complexity – Hao Lei, Jiahui He, Kai Hu and Meiqin Wang
-
Probabilistic Related-Key Statistical Saturation Cryptanalysis – Muzhou Li, Nicky Mouha, Ling Sun and Meiqin Wang
-
Fast and Efficient Hardware Implementation of HQC – Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz and Jakub Szefer
-
Threshold Implementations with Non-Uniform Inputs – Siemen Dhooghe and Artemii Ovchinnikov
-
Bit Security Analysis of Lattice-Based KEMs under Plaintext-Checking Attacks – Ruiqi Mi, Haodong Jiang and Zhenfeng Zhang
-
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH – Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun and Willi Meier
-
Improving the Rectangle Attack on GIFT-64 – Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang and Zhuohui Feng
-
Secure Function Extensions to Additively Homomorphic Cryptosystems – Mounika Pratapa and Aleksander Essex
-
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery – Melanie Jauch and Varun Maram
-
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant – Wei Wei, Min Luo, Zijian Bao, Cong Peng and Debiao He
-
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher – Shoichi Hirose and Kazuhiko Minematsu
-
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon – Amirhossein Ebrahimi Moghaddam, David Gerault and Paolo Palmieri
