selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.
.- Post-Quantum Cryptography.
.- Towards Quantum Security of Hirose Compression Function and Romulus-H.
.- Efficient Multi-instance Vector Commitment and Application to Post quantum Signatures.
.- Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium.
.- Efficient Revocable Identity-Based Encryption from Middle-Product LWE.
.- Code-based Fully Dynamic Accountable Ring Signatures and Group Signatures using the Helper Methodology.
.- Partial Key Exposure Attacks on UOV and Its Variants.
.- Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWEBased Optimization.
.- Fiat-Shamir with Rejection and Rotation.
.- Amoeba: More Flexible RLWE-based KEM.
.- Get Rid of Templates: A Chosen-Ciphertext Attack on ML-KEM with a DPA-based Self-Comparison Oracle.
.- Homomorphic Encryption and Applications.
.- Accountability for Server Misbehavior in Homomorphic Secret Sharing.
.- High-Precision Homomorphic Modular Reduction for CKKS Bootstrapping.
.- Refined Error Management for Gate Bootstrapping.
.- Cryptographic Foundations and Number Theory.
.- Compact Lifting for NTT-unfriendly Modulus.
.- Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience.
.- Solving Generalized Approximate Divisor Multiples Problems.