A Simple Forgery Attack on Pelican
Orr Dunkelman - University of Haifa
Rhizomes and the Roots of Efficiency – Improving Prio
Armando Faz-Hernandez - Cloudflare, Inc.
Runtime Code Generation for Constant-Time Secret-Indexed Array Accesses: Applications to PERK and NTRU
Décio Luiz Gazzoni Filho - State University of Londrina
Rafael G. Flores E Silva - State University of Londrina
Alessandro Budroni - Technology Innovation Institute
Marco Palumbi - Technology Innovation Institute
Gora Adj - Technology Innovation Institute
Improving special cases of the computational isogeny problem
Steven Galbraith - University of Auckland
Valerie Gilchrist - Université Libre de Bruxelles
Damien Robert - Inria Bordeaux
Post-Quantum Zero-Knowledge with Space-Bounded Simulation
Prabhanjan Ananth - Indian Institute of Science, Bangalorfe
Alex Bredariol Grilo - LIP6, CNRS/Sorbonne Université
Adaptive UC NIZK for Practical Applications
Leah Namisa Rosenbloom - Northeastern University
Anna Lysyanskaya - Brown University
Extending Regev’s quantum algorithm to elliptic curves
Razvan Barbulescu - CNRS and Institute of Mathematics of the Romanian Academy
Mugurel Barcau - Institute of Mathematics of the Romanian Academy and CertSIGN
Vicentiu Pasol - Institute of Mathematics of the Romanian Academy and CertSIGN
Fast elliptic curve scalar multiplications in SN(T)ARK circuits
Simon Masson - ZKNox
Youssef El Housni - Linea
Thomas Piellard - Linea
Liam Eagen - Alpen Labs
Generic Partial Decryption as Feature Engineering for Neural Distinguishers
Emanuele Bellini - Technology Innovation Institute, Abu Dhabi, UAE
Rocco Brunelli - Università Roma Tre, Rome, Italy
David Gerault - Technology Innovation Institute, Abu Dhabi, UAE
Anna Hambitzer - Technology Innovation Institute, Abu Dhabi, UAE
Marco Pedicini - Università Roma Tre, Rome, Italy
From at Least $n/3$ to at Most $3\sqrt{n}$: Correcting the Algebraic Immunity of the Hidden Weight Bit Function
Pierrick Méaux - Luxembourg University, Luxembourg
Cryptography and Collective Power
Leah Namisa Rosenbloom - Northeastern University
Great-LaKeys: An Improved Threshold-PRF and a Novel Exponent-VRF from LWR
Matthias Geihs - Consensys
Orient Express: Using Frobenius to Express Oriented Isogenies
Wouter Castryck - KU Leuven
Riccardo Invernizzi - KU Leuven
Gioella Lorenzon - KU Leuven
Jonas Meers - Ruhr University Bochum
Frederik Vercauteren - KU Leuven
The role of piracy in quantum proofs
Anne Broadbent - University of Ottawa
Alex Bredariol Grilo - LIP6, CNRS/Sorbonne Université
Supartha Podder - Stony Brook University
Jamie Sikora - LIAFA
The Tate Profile
Krijn Reijnders - KU Leuven
(Im)Possibility of Symmetric Encryption against Coordinated Algorithm Substitution Attacks, Key Exfiltration
Simone Colombo - King's College London
Damian Vizár - CSEM
Extracting Some Hidden Layers of Deep Neural Networks in the Hard-Label Setting
Isaac Andres Canales Martinez - Technology Innovation Institute
David Santos - Universidade Estadual de Campinas



