Accepted papers
- Generic Security of the Ascon Mode: On the Power of Key Blinding – Charlotte Lefevre and Bart Mennink
- Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? Application to PASTA – Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, and Qingju Wang
- Identity-Based Encryption from Lattices with More Compactness in the Standard Model – Weidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang, and Dawu Gu
- Multi-Key Homomorphic Encryption with Threshold Re-Encryption – Akira Nakashima, Yukimasa Sugizaki, Hikaru Tsuchida, Takuya Hayashi, Koji Nuida, Kengo Mori, and Toshiyuki Isshiki
- Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis – Trevor Hong Eng Yap, Shivam Bhasin, and Léo Weissbart
- Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC) – Katerina Mitrokotsa, Sayantan Mukherjee, and Jenit Tomy
- Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification – Kelong Cong, Robin Geelen, Jiayi Kang, and Jeongeun Park
- A Univariate Attack against the Limited-Data Instance of Ciminion – Augustin Bariant
- Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity – Xingwei Ren, Yongqiang Li, and Mingsheng Wang
- Post-Quantum Backdoor for Kyber-KEM – Wenwen Xia, Geng Wang, and Dawu Gu
- Bias from Uniform Nonce: Revised Fourier Analysis-based Attack on ECDSA – Shunsuke Osaki and Noboru Kunihiro
- Multivariate Blind Signatures Revisited – Ward Beullens
- Koala: A Low-Latency Pseudorandom Function – Yanis Belkheyar, Parisa Amiri Eliasi, Joan Daemen, Santosh Ghosh, Daniël Kuijsters, Alireza Mehrdad, Silvia Mella, Shahram Rasoolzadeh, and Gilles Van Assche
- Classical and Quantum Generic Attacks on 6-round Feistel Schemes – Maya Chartouny, Benoit Cogliati, and Jacques Patarin
- Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples – Vincent Rieder
- Weightwise (almost) perfectly balanced functions based on total orders – Pierrick Méaux
- Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and their Isogeny-based Applications – Bruno Sterner
- Simulation Secure Multi-Input Quadratic Functional Encryption – Ferran Alborch Escobar, Sébastien Canard, and Fabien Laguillaumie
- BUFFing FALCON without Increasing the Signature Size – Samed Düzlü, Rune Fiedler, and Marc Fischlin
- SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks – Max Duparc, Tako Boris Fouotsa, and Serge Vaudenay
- Multi-User Dynamic Searchable Encryption for Prefix-Fixing Predicates from Symmetric-Key Primitives – Takato Hirano, Yutaka Kawai, Yoshihiro Koseki, Satoshi Yasuda, Yohei Watanabe, Takumi Amada, Mitsugu Iwamoto, and Kazuo Ohta
- Provably Secure Online Authenticated Encryption and Bidirectional Online Channel – Arghya Bhattacharjee, Ritam Bhaumik, Daniel Collins, and Mridul Nandi
- Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV – Mustafa Khairallah
- Modular Multiplication in the AMNS representation: Hardware Implementation – Louis Noyez, Nadia El Mrabet, Olivier Potin, and Pascal Veron
- Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields – Arnab Roy and Matthias Johann Steiner