Accepted papers
- Secret in OnePiece: Fault Attack on Masked Kyber with the Vulnerability from Bit Slicing – Jian Wang, Weiqiong Cao, Hua Chen and Haoyuan Li Pre-proceeding
- The Revisited Hidden Weight Bit Function – Pierrick Méaux, Tim Seuré and Deng Tang Pre-proceeding
- Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode – Huina Li, Le He and Weidong Qiu Pre-proceeding
- PIsignHD: A New Structure for the SQIsign Family with Flexible Applicability – Kaizhan Lin, Weize Wang, Chang-An Zhao and Yunlei Zhao Pre-proceeding
- Bit Security of Quantum Key Search – Marc Fischlin and Evangelos Gkoumas Pre-proceeding
- An attack on ML-DSA using an implicit hint – Paco Azevedo-Oliveira, Jordan Beraud and Louis Goubin Pre-proceeding
- Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM – Rishub Nagpal, Vedad Hadzic, Robert Primas and Stefan Mangard Pre-proceeding
- Air-FRI: Acceleration of the FRI Protocol on the GPU for zkSNARK Applications – Tanmayi Jandhyala and Guang Gong Pre-proceeding
- Impossible Differentials Automation: Model Generation and New Techniques – Emanuele Bellini, Alessandro De Piccoli, David Gérault, Paul Huynh, Simone Pelizzola and Andrea Visconti Pre-proceeding
- Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-channel Analysis – Sengim Karayalcin, Guilherme Perin and Stjepan Picek Pre-proceeding
- Public-Key Encryption and Injective Trapdoor Functions from LWE with Large Noise Rate – Liheng Ji and Yilei Chen Pre-proceeding
- Downlink (T)FHE ciphertexts compression – Antonina Bondarchuk, Olive Chakraborty, Geoffroy Couteau and Renaud Sirdey Pre-proceeding
- Unified MEDS Accelerator – Sanjay Deshpande, Yongseok Lee, Mamuri Nawan, Kashif Nawaz, Ruben Niederhagen, Yunheung Paek, Jakub Szefer Pre-proceeding
- Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs – Andreas Weninger, Amit Singh Bhati and Elena Andreeva Pre-proceeding
- Practical Attack on All Parameters of the HPPC Signature Scheme – Pierre Briaud, Maxime Bros, Ray Perlner and Daniel Smith-Tone Pre-proceeding
- Blockcipher-Based Key Commitment for Nonce-Derived Schemes – Panos Kampanakis, Shai Halevi, Nevine Ebeid and Matthew Campagna Pre-proceeding
- How (not) to Build Identity-Based Encryption from Isogenies – Elif Özbay Gürler and Patrick Struck Pre-proceeding
- Picking up the Fallen Mask: Breaking and Fixing the RS-Mask Countermeasure – Dilara Toprakhisar, Svetla Nikova and Ventzislav Nikov Pre-proceeding
- Minimalist model for Impossible Differentials – Patrick Derbez and Marie Euler Pre-proceeding
- Breaking the Twinkle Authentication Scheme and Analyzing Its Underlying Permutation – Debasmita Chakraborty, Hosein Hadipour, Anup Kumar Kundu, Mostafizar Rahman, Prathamesh Ram, Yu Sasaki, Dilip Sau and Aman Sinha Pre-proceeding
- Multi-precision PMNS with CIOS reduction – François Palma, Pascal Veron and Nicolas Méloni Pre-proceeding
- Algebraic Key-Recovery Side-Channel Attack on Classic McEliece – Michaël Bulois, Pierre-Louis Cayrel, Vlad-Florin Drăgoi and Vincent Grosso Pre-proceeding
- High-Throughput EdDSA Verification on Intel Processors with Advanced Vector Extensions – Bowen Zhang, Hao Cheng, Johann Großschädl and Peter Y. A. Ryan Pre-proceeding
- Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519 – Marcel Nageler, Lorenz Schmid and Maria Eichlseder Pre-proceeding
- AI for Code-based Cryptography – Mohamed Malhou, Ludovic Perret and Kristin Lauter Pre-proceeding
- Accelerating Post-quantum Secure zkSNARKs by Optimizing Additive FFT – Mohammadtaghi Badakhshan, Susanta Samanta and Guang Gong Pre-proceeding
- Efficient Full Domain Functional Bootstrapping from Recursive LUT Decomposition – Intak Hwang, Shinwon Lee, Seonhong Min and Yongsoo Song Pre-proceeding
- Collision Attacks on SPONGENT with Grouping Method – Keita Toyama, Kosei Sakamoto and Takanori Isobe Pre-proceeding
- Bounded CCA2 Secure Proxy Re-encryption from Lattices – Shingo Sato and Junji Shikata Pre-proceeding