Accepted Papers
The proceedings are available here.
- Impossibilities in Succinct Arguments: Black-box Extraction and More
Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh and Janno Siim.
. - Invertible Quadratic Non-Linear Functions over F_p^n via Multiple Local Maps
Ginevra Giordani, Lorenzo Grassi, Silvia Onofri and Marco Pedicini.
. - Universal hashing based on field multiplication and (near-)MDS matrices.
Koustabh Ghosh, Joan Daemen, Parisa Eliasi and Jonathan Fuchs.
. - Efficient computation of (3n,3n)-isogenies
Thomas Decru and Sabrina Kunzweiler.
. - MinRank in the Head: Short Signatures from Zero-Knowledge Proofs
Gora Adj, Luis Rivera-Zamarripa and Javier Verbel.
. - Quantum Search-to-Decision Reduction for the LWE Problem
Kyohei Sudo, Masayuki Tezuka, Keisuke Hara and Yusuke Yoshida.
. - The curious case of the half-half Bitcoin ECDSA nonces
Dylan Rowe, Joachim Breitner and Nadia Heninger.
. - Concrete Security from Worst-Case to Average-Case Lattice Reductions
Joel Gärtner.
. - Take your MEDS: Digital Signatures from Matrix Code Equivalence
Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska and Monika Trimoska.
. - Poseidon2: A Faster Version of the Poseidon Hash Function
Lorenzo Grassi, Dmitry Khovratovich and Markus Schofnegger.
. - Finding and Evaluating Parameters for BGV
Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu and Najwa Aaraj.
. - Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7
James Howe and Bas Westerbaan.
. - A Side-Channel Attack against Classic McEliece implementation
Boly Seck, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Idy Diop, Morgan Barbier, Jean Belo Klamti, Vincent Grosso and Brice Colombier.
. - The special case of cyclotomic fields in quantum algorithms for unit groups
Razvan Barbulescu and Adrien Poulalion.
. - On the Post-Quantum Security of Classical Authenticated Encryption Schemes
Nathalie Lang and Stefan Lucks.
. - Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions
Duc Tri Nguyen and Kris Gaj.
. - From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers
Jikang Lin, Jiahui He, Yanhong Fan and Meiqin Wang.
. - Applications of Timed-release Encryption with Implicit Authentication
Angelique Faye Loe, Liam Medley, Christian O’Connell and Elizabeth Quaglia.
. - Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant
Abderrahmane Nitaj and Maher Boudabra.
. - ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain
Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey and Martin Zuber.
. - Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality
Mario Larangeira and Maxim Jourenko.