Accepted papers
-
Secret in OnePiece: Single-Bit Fault Attack on Kyber – Jian Wang, Weiqiong Cao, Hua Chen and Haoyuan Li
-
The Revisited Hidden Weight Bit Function – Pierrick Méaux, Tim Seuré and Deng Tang
-
Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode – Huina Li, Le He and Weidong Qiu
-
PIsignHD: A New Structure for the SQIsign Family with Flexible Applicability – Kaizhan Lin, Weize Wang, Chang-An Zhao and Yunlei Zhao
-
Bit Security of Quantum Key Search – Marc Fischlin and Evangelos Gkoumas
-
An attack on ML-DSA using an implicit hint – Paco Azevedo-Oliveira, Jordan Beraud and Louis Goubin
-
Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM – Rishub Nagpal, Vedad Hadzic, Robert Primas and Stefan Mangard
-
Air-FRI: Acceleration of the FRI Protocol on the GPU for zkSNARK Applications – Tanmayi Jandhyala and Guang Gong
-
Impossible Differentials Automation: Model Generation and New Techniques – Emanuele Bellini, Alessandro De Piccoli, David Gérault, Paul Huynh, Simone Pelizzola and Andrea Visconti
-
Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-channel Analysis – Sengim Karayalcin, Guilherme Perin and Stjepan Picek
-
Public-Key Encryption and Injective Trapdoor Functions from LWE with Large Noise Rate – Liheng Ji and Yilei Chen
-
Downlink (T)FHE ciphertexts compression – Antonina Bondarchuk, Olive Chakraborty, Geoffroy Couteau and Renaud Sirdey
-
Unified MEDS Accelerator – Sanjay Deshpande, Yongseok Lee, Mamuri Nawan, Kashif Nawaz, Ruben Niederhagen, Yunheung Paek, Jakub Szefer
-
Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs – Andreas Weninger, Amit Singh Bhati and Elena Andreeva
-
Practical Attack on All Parameters of the HPPC Signature Scheme – Pierre Briaud, Maxime Bros, Ray Perlner and Daniel Smith-Tone
-
Blockcipher-Based Key Commitment for Nonce-Derived Schemes – Panos Kampanakis, Shai Halevi, Nevine Ebeid and Matthew Campagna
-
How (not) to Build Identity-Based Encryption from Isogenies – Elif Özbay Gürler and Patrick Struck
-
Picking up the Fallen Mask: Breaking and Fixing the RS-Mask Countermeasure – Dilara Toprakhisar, Svetla Nikova and Ventzislav Nikov
-
Minimalist model for Impossible Differentials – Patrick Derbez and Marie Euler
-
Breaking the Twinkle Authenticated Encryption Scheme and Analyzing Its Underlying Permutation – Debasmita Chakraborty, Hosein Hadipour, Anup Kumar Kundu, Mostafizar Rahman, Prathamesh Ram, Yu Sasaki, Dilip Sau and Aman Sinha
-
Multi-precision PMNS with CIOS reduction – François Palma, Pascal Veron and Nicolas Méloni
-
Algebraic Key-Recovery Side-Channel Attack on Classic McEliece – Michaël Bulois, Pierre-Louis Cayrel, Vlad-Florin Drăgoi and Vincent Grosso
-
High-Throughput EdDSA Verification on Intel Processors with Advanced Vector Extensions – Bowen Zhang, Hao Cheng, Johann Großschädl and Peter Y. A. Ryan
-
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519 – Marcel Nageler, Lorenz Schmid and Maria Eichlseder
-
AI for Code-based Cryptography – Mohamed Malhou, Ludovic Perret and Kristin Lauter
-
Accelerating Post-quantum Secure zkSNARKs by Optimizing Additive FFT – Mohammadtaghi Badakhshan, Susanta Samanta and Guang Gong
-
Efficient Full Domain Functional Bootstrapping from Recursive LUT Decomposition – Intak Hwang, Shinwon Lee, Seonhong Min and Yongsoo Song
-
Collision Attacks on SPONGENT with Grouping Method – Keita Toyama, Kosei Sakamoto and Takanori Isobe
-
Bounded CCA2 Secure Proxy Re-encryption from Lattices – Shingo Sato and Junji Shikata
