| 1 | Multicast Key Agreement, Revisited | Alexander Bienstock, Yevgeniy Dodis and Yi Tang |
| 2 | A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption | Benoit Chevallier-Mames |
| 3 | Faster Isogenies for Quantum-Safe SIKE | Brian Koziel, Rami Elkhatib and Reza Azarderakhsh |
| 4 | Fully projective radical isogenies in constant-time | Krijn Reijnders and Jesus-Javier Chi-Dominguez |
| 5 | Private Liquidity Matching using MPC | Shahla Atapoor, Nigel Smart and Younes Talibi Alaoui |
| 6 | Approximate Homomorphic Encryption with Reduced Approximation Error | Andrey Kim, Antonis Papadimitriou and Yuriy Polyakov |
| 7 | Attacks on Pseudo Random Number Generators Hiding a Linear Structure | Florette Martinez |
| 8 | Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA | Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan and Wenling Wu |
| 9 | More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes | Han Wu and Guangwu Xu |
| 10 | Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128 | Jiamin Cui, Kai Hu, Qingju Wang and Meiqin Wang |
| 11 | Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3 | Yanhong Fan, Muzhou Li, Chao Niu, Zhenyu Lu and Meiqin Wang |
| 12 | Side-Channeling the Kalyna Key Expansion | Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom and Zhiyuan Zhang |
| 13 | Fake it till you make it: data augmentation using Generative Adversarial Networks for all the crypto you need on small devices | Naila Mukhtar, Lejla Batina, Stjepan Picek and Yinan Kong |
| 14 | A New Adaptive Attack on SIDH | Tako Boris Fouotsa and Christophe Petit |
| 15 | On Fingerprinting Attacks and Length-Hiding Encryption | Kai Gellert, Tibor Jager, Lin Lyu and Tom Neuschulten |
| 16 | CCA security for Posteriori Openable Encryption and Generic Instantiation in the Standard Model | Xavier Bultel |
| 17 | Dynamic Universal Accumulator with Batch Update over Bilinear Groups | Giuseppe Vitto and Alex Biryukov |
| 18 | Adaptively Secure Laconic Function Evaluation for NC1 | Răzvan Roşie |
| 19 | FASTA – a stream cipher for fast FHE evaluation | Carlos Cid, John Petter Indrøy and Håvard Raddum |
| 20 | New Attacks from Old Distinguishers, Improved Attacks on Serpent | Marek Broll, Federico Canale, Nicolas David, Antonio Florez-Gutierrez, Gregor Leander, Maria Naya-Plasencia and Yosuke Todo |
| 21 | Pholkos – Efficient Large-state Tweakable Block Ciphers from the AES Round Function | Jannis Bossert, Eik List, Stefan Lucks and Sebastian Schmitz |
| 22 | Robust Subgroup Multi-Signatures for Consensus | David Galindo and Jia Liu |
| 23 | Subversion-Resilient Enhanced Privacy ID | Antonio Faonio, Dario Fiore, Claudio Soriente and Luca Nizzardo |
| 24 | PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument | Shuang Wu, Mayank Raikwar and Kristian Gjøsteen |