Accepted Papers

  1. Multi-User Security of the Elephant v2 Authenticated Encryption Mode. Tim Beyne, Yu Long Chen, Christoph Dobraunig and Bart Mennink.

Recorded talk

  1. Designing S-boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR. Yosuke Todo and Yu Sasaki.

Recorded talk

  1. Parallel Verification of Serial MAC and AE Modes. Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri and Hiroyasu Kubo.

Recorded talk

  1. Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang and Siu-Ming Yiu.

Recorded talk

  1. Improved Attacks on GIFT-64 . Ling Sun, Wei Wang and Meiqin Wang.

Recorded talk

  1. A Simpler Model for Recovering Superpoly on Trivium. Stephanie Delaune, Patrick Derbez, Arthur Gontier and Charles Prud'Homme.

Recorded talk

  1. Automated Truncation of Differential Trails and Trail Clustering in ARX. Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov and Giuseppe Vitto.

Recorded talk

  1. MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps. Ward Beullens

Recorded talk

  1. Simple and Memory-efficient Signature Generation of XMSS^MT. Haruhisa Kosuge and Hidema Tanaka

Recorded talk

  1. Zaytun: Lattice based PKE and KEM with Shorter Ciphertext Size. Parhat Abla and Mingsheng Wang.

Recorded talk

  1. A Polynomial Time Key-recovery Attack on the Sidon Cryptosystem. Pierre Briaud, Javier Verbel and Jean-Pierre Tillich.

Recorded talk

  1. Verifiable Isogeny Walks: Towards an Isogeny-based Postquantum VDF. Jorge Chavez-Saab, Francisco Rodríguez-Henríquez and Mehdi Tibouchi.

Recorded talk

  1. Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies. Edward Eaton, David Jao, Chelsea Komlo and Youcef Mokrani.

Recorded talk

  1. Secret Keys in Genus-2 SIDH. Sabrina Kunzweiler, Yan Bo Ti and Charlotte Weitkämper.

Recorded talk

  1. Improved Quantum Algorithms for the k-XOR Problem. André Schrottenloher.

Recorded talk

  1. Quantum Boomerang Attacks and Some Applications. Paul Frixons, María Naya-Plasencia and André Schrottenloher.

Recorded talk

  1. On Evaluating Anonymity of Onion Routing. Alessandro Melloni, Martijn Stam and Øyvind Ytrehus.

Recorded talk

  1. Revisiting Driver Anonymity in ORide. Deepak Kumaraswamy, Shyam Murthy and Srinivas Vivek.

Recorded talk

  1. The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application. Keita Xagawa.

Recorded talk

  1. ZKAttest: Ring and Group Signatures for Existing ECDSA Keys. Armando Faz-Hernandez, Watson Ladd and Deepak Maram.

Recorded talk

  1. A Low-Randomness Second-Order Masked AES. Siemen Dhooghe, Tim Beyne, Adrián Ranea and Danilo Šijačić.

Recorded talk

  1. How Do the Arbiter PUFs Sample the Boolean Function Class? Animesh Roy, Dibyendu Roy and Subhamoy Maitra.

Recorded talk

  1. MPC for $Q_2$ Access Structures over Rings and Fields. Robin Jadoul, Nigel Smart and Barry Van Leeuwen.

Recorded talk