Accepted papers
- Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification – Kelong Cong, Robin Geelen, Jiayi Kang, and Jeongeun Park • published version (DOI)
- Simulation Secure Multi-Input Quadratic Functional Encryption – Ferran Alborch Escobar, Sébastien Canard, and Fabien Laguillaumie • published version (DOI)
- Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples – Vincent Rieder • published version (DOI)
- Multi-Key Homomorphic Encryption with Threshold Re-Encryption – Akira Nakashima, Yukimasa Sugizaki, Hikaru Tsuchida, Takuya Hayashi, Koji Nuida, Kengo Mori, and Toshiyuki Isshiki • published version (DOI)
- Multi-User Dynamic Searchable Encryption for Prefix-Fixing Predicates from Symmetric-Key Primitives – Takato Hirano, Yutaka Kawai, Yoshihiro Koseki, Satoshi Yasuda, Yohei Watanabe, Takumi Amada, Mitsugu Iwamoto, and Kazuo Ohta • published version (DOI)
- BUFFing FALCON without Increasing the Signature Size – Samed Düzlü, Rune Fiedler, and Marc Fischlin • published version (DOI)
- SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks – Max Duparc, Tako Boris Fouotsa, and Serge Vaudenay • published version (DOI)
- Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and their Isogeny-based Applications – Bruno Sterner • published version (DOI)
- Bias from Uniform Nonce: Revised Fourier Analysis-based Attack on ECDSA – Shunsuke Osaki and Noboru Kunihiro • published version (DOI)
- Multivariate Blind Signatures Revisited – Ward Beullens • published version (DOI)
- Post-Quantum Backdoor for Kyber-KEM – Wenwen Xia, Geng Wang, and Dawu Gu • published version (DOI)
- Identity-Based Encryption from Lattices with More Compactness in the Standard Model – Weidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang, and Dawu Gu • published version (DOI)
- Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC) – Katerina Mitrokotsa, Sayantan Mukherjee, and Jenit Tomy • published version (DOI)
- Generic Security of the Ascon Mode: On the Power of Key Blinding – Charlotte Lefevre and Bart Mennink • published version (DOI)
- Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV – Mustafa Khairallah • published version (DOI)
- Provably Secure Online Authenticated Encryption and Bidirectional Online Channels – Arghya Bhattacharjee, Ritam Bhaumik, Daniel Collins, and Mridul Nandi • published version (DOI)
- Classical and Quantum Generic Attacks on 6-round Feistel Schemes – Maya Chartouny, Benoît Cogliati, and Jacques Patarin • published version (DOI)
- Weightwise (Almost) Perfectly Balanced Functions Based on Total Orders – Pierrick Méaux • published version (DOI)
- Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields – Arnab Roy and Matthias Johann Steiner • published version (DOI)
- A Univariate Attack against the Limited-Data Instance of Ciminion – Augustin Bariant • published version (DOI)
- Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity – Xingwei Ren, Yongqiang Li, and Mingsheng Wang • published version (DOI)
- Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? Application to PASTA – Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, and Qingju Wang • published version (DOI)
- Koala: A Low-Latency Pseudorandom Function – Yanis Belkheyar, Parisa Amiri Eliasi, Joan Daemen, Santosh Ghosh, Daniël Kuijsters, Alireza Mehrdad, Silvia Mella, Shahram Rasoolzadeh, and Gilles Van Assche • published version (DOI)
- Modular Multiplication in the AMNS representation : Hardware Implementation – Louis Noyez, Nadia El Mrabet, Olivier Potin, and Pascal Veron • published version (DOI)
- Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Deep Learning-based Side-Channel Analysis – Trevor Hong Eng Yap, Shivam Bhasin, and Léo Weissbart • published version (DOI)