Code-Based Cryptography An extension of Overbeck's attack with an application to cryptanalysis of Twisted Gabidulin-based schemes Alain Couvreur and Ilaria Zappatore Cryptanalysis of rank-metric schemes based on distorted Gabidulin codes Pierre Briaud and Pierre Loidreau A High-Performance Hardware Implementation of the LESS Digital Signature Scheme Luke Beckwith, Robert Wallace, Kamyar Mohajerani and Kris Gaj Wave Parameter Selection Nicolas Sendrier Group-Action-Based Cryptography SPDH-Sign: towards Efficient, Post-quantum, Group-based Signatures Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret and Siamak F. Shahandashti Isogeny-Based Cryptography A Tightly Secure Identity-based Signature Scheme from Isogenies Jiawei Chen, Hyungrok Jo, Shingo Sato and Junji Shikata Lattice-Based Cryptography New NTRU Records with Improved Lattice Bases Elena Kirshanova, Alexander May and Julian Nowakowski On the Hardness of Scheme-Switching Between SIMD FHE Schemes Karim Eldefrawy, Nicholas Genise and Nathan Manohar Classical and quantum 3 and 4-sieves to solve SVP with low memory André Chailloux and Johanna Loyer NTRU in Quaternion Algebras of Bounded Discriminant Cong Ling and Andrew Mendelsohn Do not bound to a single position: near-optimal multi-positional mismatch attacks against Syber and Saber Qian Guo and Erik Mårtensson NTWE: A Natural Combination of NTRU and LWE Joel Gärtner Multivariate Cryptography Fast Enumeration Algorithm For Multivariate Polynomials Over General Finite Fields Hiroki Furue and Tsuyoshi Takagi DME: a full encryption, signature and KEM multivariate public key cryptosystem Ignacio Luengo, Martín Avendaño and Pilar Coscojuela Quantum Algorithms, Cryptanalysis and Models On the Quantum Security of HAWK Serge Fehr and Yu-Hsuan Huang Non-Observable Quantum Random Oracle Model Navid Alamati, Varun Maram and Daniel Masny Characterizing the qIND-qCPA (In)security of the CBC, CFB, OFB and CTR Modes of Operation Tristan Nemoz, Zoé Amblard and Aurélien Dupin Breaking the Quadratic Barrier: Quantum Cryptanalysis of Milenage, Telecommunications' Cryptographic Backbone Vincent Quentin Ulitzsch and Jean-Pierre Seifert Time and Query Complexity Tradeoffs for the Dihedral Coset Problem Maxime Remaud, André Schrottenloher and Jean-Pierre Tillich Post-Quantum Protocols Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation Jason Goertzen and Douglas Stebila Hash-based Direct Anonymous Attestation Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton and Yalan Wang Muckle+: End-to-End Hybrid Authenticated Key Exchanges Sonja Bruckner, Sebastian Ramacher and Christoph Striecks Side-Channel Cryptanalysis and Countermeasures WrapQ: Side-Channel Secure Key Management for Post-Quantum Cryptography Markku-Juhani O. Saarinen Faulting Winternitz One-Time Signatures to forge LMS, XMSS, or SPHINCS+ signatures Alexander Wagner, Vera Wesselkamp, Felix Oberhansl, Marc Schink and Emanuele Strieder Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware Hauke Steffen, Georg Land, Lucie Kogelheide and Tim Güneysu