Accepted Papers
The list of accepted papers is also available with abstracts.
- Shahla Atapoor, Karim Baghery, Daniele Cozzo and Robi Pedersen. CSI-SharK: CSI-FiSh with Sharing-friendly Keys (details)
- Matthew Beighton, Harry Bartlett, Leonie Simpson and Kenneth Koon-Ho Wong. Key Recovery Attacks on Grain-like Keystream Generators with Key Injection (details)
- Francesco Berti. Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure (details)
- Colin Boyd, Bor de Kock and Lise Millerjord. Modular Design of KEM-Based Authenticated Key Exchange (details)
- Cheng Che and Tian Tian. A New Correlation Cube Attack Based on Division Property (details)
- Huiqin Chen, Yongqiang Li, Parhat Abla, Zhiran Li, Lin Jiao and Mingsheng Wang. Quantum Algorithm for Finding Impossible Differentials and Zero-correlation Linear Hulls of Symmetric Ciphers (details)
- Jingjing Fan, Xingye Lu and Man Ho Au. Adaptively Secure Identity-Based Encryption from Middle-Product Learning with ErrorLattice-Based Cryptography \and Middle-Product LWE \and Identity-Based Encryption (details)
- Zhuohui Feng, Ye Luo, Qianqian Yang, Chao Wang, Zhiquan Liu and Ling Song. Improved Differential Cryptanalysis on SPECK Using Plaintext Structures (details)
- Ren Ishibashi and Kazuki Yoneyama. Compact Password Authenticated Key Exchange from Group Actions (details)
- Masahito Ishizaka and Kazuhide Fukushima. Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications (details)
- Maliha Ismail, Yan Lin, Donggyun Han and Debin Gao. BinAlign: Alignment Padding based Compiler Provenance Recovery (details)
- Malika Izabachène, Lucas Prabel and Adeline Roux-Langlois. Identity-based encryption from lattices using approximate trapdoors (details)
- Naoto Kimura, Atsushi Takayasu and Tsuyoshi Takagi. Memory-Efficient Quantum Information Set Decoding Algorithm (details)
- Qinyi Li and Ernest Foo. Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model (details)
- Jia-Chng Loh, Fuchun Guo, Willy Susilo and Guomin Yang. A Tightly Secure ID-Based Signature Scheme under DL Assumption in AGM (details)
- Akash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong and Bart Preneel. Reusable, Instant and Private Payment Guarantees for Cryptocurrencies (details)
- Yongxia Mao, Wenling Wu, Yafei Zheng and Lei Zhang. Related-Cipher Attacks: Applications to Ballet and ANT (details)
- Nicky Mouha. Exploring Formal Methods for Cryptographic Hash Function Implementations (details)
- Sayantan Mukherjee. Statistically Consistent Broadcast Authenticated Encryption with Keyword Search: Adaptive Security from Standard Assumptions (details)
- Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Liu Fukang and Takanori Isobe. Ghidle: Efficient Large-State Block Ciphers for Post-Quantum Security (details)
- Zulu Okonkwo, Ernest Foo, Zhe Hou, Qinyi Li and Zahra Jadidi. Encrypted Network Traffic Classification with Higher Order Graph Neural Network (details)
- Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel and Meiqin Wang. Cryptanalysis of SPEEDY (details)
- Xiaofeng Xie and Tian Tian. The Triangle Differential Cryptanalysis (details)
- Pei-Ying Xu and Li-Ping Wang. Multi-key Homomorphic Secret Sharing from LWE without Multi-key HE (details)
- Zeyu Xu, Shiyao Chen, Meiqin Wang and Puwen Wei. Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly $\mathbb{F}_p$-based Ciphers (details)
- Quan Yuan, Mehdi Tibouchi and Masayuki Abe. Quantum-access Security of Hash-based Signature Schemes (details)
- Tsz Hon Yuen, Shimin Pan, Sheng Huang and Xiaoting Zhang. Practical Verifiable Random Function with RKA Security (details)