[New] Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs (Debasmita Chakraborty and Hosein Hadipour and Phuong Hoa Nguyen and Maria Eichlseder)
[Revised] Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model) (Chaya Ganesh and Claudio Orlandi and Mahak Pancholi and Akira Takahashi and Daniel Tschudi)
[New] MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography (Weihao Bai and Long Chen and Qianwen Gao and Zhenfeng Zhang)
[New] A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level (Diego F. Aranha and Georgios Fotiadis and Aurore Guillevic)
[New] Generalized class group actions on oriented elliptic curves with level structure (Sarah Arpin and Wouter Castryck and Jonathan Komada Eriksen and Gioella Lorenzon and Frederik Vercauteren)
[New] Efficient theta-based algorithms for computing $(\ell, \ell)$-isogenies on Kummer surfaces for arbitrary odd $\ell$ (Ryo Yoshizumi and Hiroshi Onuki and Ryo Ohashi and Momonari Kudo and Koji Nuida)
[Revised] A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem (Christopher Battarbee and Delaram Kahrobaei and Ludovic Perret and Siamak F. Shahandashti)
[New] On the Complexity of Cryptographic Groups and Generic Group Models (Cong Zhang and Keyu Ji and Taiyu Wang and Bingsheng Zhang and Hong-Sheng Zhou and Xin Wang and Kui Ren)
[Revised] Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$ (Corentin Le Coz and Christopher Battarbee and Ramn Flores and Thomas Koberda and Delaram Kahrobaei)
[Revised] On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups (Dario Catalano and Dario Fiore and Rosario Gennaro and Emanuele Giunta)
[New] H: Horizontally-Scalable zkSNARKs via Proof Aggregation (Michael Rosenberg and Tushar Mopuri and Hossein Hafezi and Ian Miers and Pratyush Mishra)
[Revised] Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use (Andreea Alexandru and Ahmad Al Badawi and Daniele Micciancio and Yuriy Polyakov)
[Revised] Application of Mordell-Weil lattices with large kissing numbers to acceleration of multi-scalar multiplication on elliptic curves (Dmitrii Koshelev)
[Revised] SoK: Zero-Knowledge Range Proofs (Miranda Christ and Foteini Baldimtsi and Konstantinos Kryptos Chalkias and Deepak Maram and Arnab Roy and Joy Wang)
[New] Scalable Collaborative zk-SNARK and Its Application to Efficient Proof Outsourcing (Xuanming Liu and Zhelei Zhou and Yinghao Wang and Jinye He and Bingsheng Zhang and Xiaohu Yang and Jiaheng Zhang)
[Revised] Revisiting Oblivious Top-$k$ Selection with Applications to Secure $k$-NN Classification (Kelong Cong and Robin Geelen and Jiayi Kang and Jeongeun Park)
[New] PIGEON: A Framework for Private Inference of Neural Networks (Christopher Harth-Kitzerow and Yongqin Wang and Rachit Rajat and Georg Carle and Murali Annavaram)
[New] Switching Off your Device Does Not Protect Against Fault Attacks (Paul Grandamme and Pierre-Antoine Tissot and Lilian Bossuet and Jean-Max Dutertre and Brice Colombier and Vincent Grosso)
[Revised] Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure (Rei Ueno and Hiromichi Haneda and Naofumi Homma and Akiko Inoue and Kazuhiko Minematsu)
[Revised] Aggregating Falcon Signatures with LaBRADOR (Marius A. Aardal and Diego F. Aranha and Katharina Boudgoust and Sebastian Kolby and Akira Takahashi)
[New] On round elimination for special-sound multi-round identification and the generality of the hypercube for MPCitH (Andreas Hlsing and David Joseph and Christian Majenz and Anand Kumar Narayanan)
[Revised] Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers (Anasuya Acharya and Carmit Hazay and Vladimir Kolesnikov and Manoj Prabhakaran)
[New] Practical Mempool Privacy via One-time Setup Batched Threshold Encryption (Arka Rai Choudhuri and Sanjam Garg and Guru-Vamsi Policharla and Mingyuan Wang)
[Revised] Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism (Suparna Kundu and Archisman Ghosh and Angshuman Karmakar and Shreyas Sen and Ingrid Verbauwhede)
[Revised] A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium (Roberto La Scala and Federico Pintore and Sharwan K. Tiwari and Andrea Visconti)
[Revised] Exponential Quantum Speedup for the Traveling Salesman Problem (Anant Sharma and Nupur Deshpande and Sanchita Ghosh and Sreetama Das and Shibdas Roy)
[Revised] BumbleBee: Secure Two-party Inference Framework for Large Transformers (Wen-jie Lu and Zhicong Huang and Zhen Gu and Jingyu Li and Jian Liu and Cheng Hong and Kui Ren and Tao Wei and WenGuang Chen)
[New] SoK: An Engineers Guide to Post-Quantum Cryptography for Embedded Devices (Maximilian Pursche and Nikolai Puch and Sebastian N. Peters and Michael P. Heinl)
[New] Securing the Future of GenAI: Policy and Technology (Mihai Christodorescu and Ryan Craven and Soheil Feizi and Neil Gong and Mia Hoffmann and Somesh Jha and Zhengyuan Jiang and Mehrdad Saberi Kamarposhti and John Mitchell and Jessica Newman and E...
[New] zk-Promises: Making Zero-Knowledge Objects Accept the Call for Banning and Reputation (Maurice Shih and Michael Rosenberg and Harikesh Kailad and Ian Miers)
[Revised] Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models (Elijah Pelofske and Vincent Urias and Lorie M. Liebrock)
[Revised] Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability (Zhongtang Luo and Yanxue Jia and Yaobin Shen and Aniket Kate)
[Revised] Improved Alternating-Moduli PRFs and Post-Quantum Signatures (Navid Alamati and Guru-Vamsi Policharla and Srinivasan Raghuraman and Peter Rindal)
[Revised] Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More (Damiano Abram and Lawrence Roy and Mark Simkin)