Accepted Papers
Multi-User Security of the Elephant v2 Authenticated Encryption Mode. Tim Beyne, Yu Long Chen, Christoph Dobraunig and Bart Mennink.
Designing S-boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR. Yosuke Todo and Yu Sasaki.
Parallel Verification of Serial MAC and AE Modes. Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri and Hiroyasu Kubo.
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang and Siu-Ming Yiu.
Improved Attacks on GIFT-64 . Ling Sun, Wei Wang and Meiqin Wang.
A Simpler Model for Recovering Superpoly on Trivium. Stephanie Delaune, Patrick Derbez, Arthur Gontier and Charles Prud'Homme.
Automated Truncation of Differential Trails and Trail Clustering in ARX. Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov and Giuseppe Vitto.
Simple and Memory-efficient Signature Generation of XMSS^MT. Haruhisa Kosuge and Hidema Tanaka
Zaytun: Lattice based PKE and KEM with Shorter Ciphertext Size. Parhat Abla and Mingsheng Wang.
A Polynomial Time Key-recovery Attack on the Sidon Cryptosystem. Pierre Briaud, Javier Verbel and Jean-Pierre Tillich.
Verifiable Isogeny Walks: Towards an Isogeny-based Postquantum VDF. Jorge Chavez-Saab, Francisco Rodríguez-Henríquez and Mehdi Tibouchi.
Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies. Edward Eaton, David Jao, Chelsea Komlo and Youcef Mokrani.
Secret Keys in Genus-2 SIDH. Sabrina Kunzweiler, Yan Bo Ti and Charlotte Weitkämper.
Improved Quantum Algorithms for the k-XOR Problem. André Schrottenloher.
Quantum Boomerang Attacks and Some Applications. Paul Frixons, María Naya-Plasencia and André Schrottenloher.
On Evaluating Anonymity of Onion Routing. Alessandro Melloni, Martijn Stam and Øyvind Ytrehus.
Revisiting Driver Anonymity in ORide. Deepak Kumaraswamy, Shyam Murthy and Srinivas Vivek.
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application. Keita Xagawa.
ZKAttest: Ring and Group Signatures for Existing ECDSA Keys. Armando Faz-Hernandez, Watson Ladd and Deepak Maram.
A Low-Randomness Second-Order Masked AES. Siemen Dhooghe, Tim Beyne, Adrián Ranea and Danilo Šijačić.
How Do the Arbiter PUFs Sample the Boolean Function Class? Animesh Roy, Dibyendu Roy and Subhamoy Maitra.
MPC for $Q_2$ Access Structures over Rings and Fields. Robin Jadoul, Nigel Smart and Barry Van Leeuwen.