Cryptanalysis of Lightweight Ciphers
More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH
Improving the Rectangle Attack on GIFT-64
Side-Channel Attacks and Countermeasures
Mask Compression: High-Order Masking on Memory-Constrained Devices
Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme
Threshold Implementations with Non-Uniform Inputs
Post-Quantum Constructions
SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant
Symmetric cryptography and fault attacks
The Random Fault Model
Probabilistic Related-Key Statistical Saturation Cryptanalysis
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
Post-Quantum Analysis and Implementations
Bit Security Analysis of Lattice-Based KEMs under Plaintext-Checking Attacks
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery
Fast and Efficient Hardware Implementation of HQC
Homomorphic encryption
On the Precision Loss in Approximate Homomorphic Encryption
Secure Function Extensions to Additively Homomorphic Cryptosystems
Public-Key Cryptography
Generalized Implicit Factorization Problem
Differential Cryptanalysis
CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon.