- Defeating «NewHope» with a Single Trace,Dorian Amiet, Andreas Curiger, Lukas Leuenberger and Paul Zbinden
- Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme,Daniel Apon, Dustin Moody, Ray Perlner, Daniel Smith-Tone and Javier Verbel
- LegRoast: Efficient post-quantum signatures from the Legendre PRF,Ward Beullens and Cyprien Delpech de Saint Guilhem
- Decryption failure is more likely after success,Nina Bindel and John M. Schanck
- Compact Privacy Protocols from Post-Quantum and Timed Classical Assumptions,Jonathan Bootle, Anja Lehmann, Vadim Lyubashevsky and Gregor Seiler
- Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy,Cecilia Boschini, Jan Camenisch, Nicholas Spooner and Max Ovsiankin
- CSIDH on the surface,Wouter Castryck and Thomas Decru
- The supersingular isogeny problem in genus 2 and beyond,Craig Costello and Benjamin Smith
- Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol,Daniele Cozzo and Nigel Smart
- Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange,Benjamin Dowling, Torben Brandt Hansen and Kenneth G. Paterson
- QC-MDPC decoders with several shades of gray,Nir Drucker, Shay Gueron and Dusan Kostic
- A Note on the Instantiability of the Quantum Random Oracle,Edward Eaton and Fang Song
- A Structural Attack on Block-Anti-Circulant UOV at SAC 2019,Hiroki Furue, Koha Kinjo, Yasuhiko Ikematsu, Yacheng Wang and Tsuyoshi Takagi
- Collapseability of Tree Hashes,Aldo Gunsing and Bart Mennink
- Improved quantum circuits for elliptic curve discrete logarithms,Thomas Häner, Samuel Jaques, Michael Naehrig, Martin Roetteler and Mathias Soeken
- The Power of Few Qubits and Collisions -- Subset Sum below Grover's Bound,Alexander Helm and Alexander May
- On quantum distinguishers for Type-3 Generalized Feistel network based on separability,Samir Hodžić, Lars Ramkilde Knudsen and Andreas Brasen Kidmose
- Isochronous Gaussian Sampling: From Inception to Implementation,James Howe, Thomas Prest, Thomas Ricosset and Mélissa Rossi
- Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security,Juliane Krämer and Patrick Struck
- Benchmarking Post-Quantum Cryptography in TLS,Christian Paquin, Douglas Stebila and Goutam Tamvada
- Efficient Key Generation for Rainbow,Albrecht Petzoldt
- Randomized Decoding of Gabidulin Codes Beyond the Unique Decoding Radius,Julian Renner, Thomas Jerkovits, Hannes Bartz, Sven Puchinger, Pierre Loidreau and Antonia Wachter-Zeh
- Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption,Bagus Santoso
- About Low DFR for QC-MDPC Decoding,Nicolas Sendrier and Valentin Vasseur
- A Rank Attack Against Extension Field Cancellation,Daniel Smith-Tone and Javier Verbel
- Practical Cryptanalysis of k-ary C*,Daniel Smith-Tone
- Short Zero-Knowledge Proof of Knowledge for Lattice-Based Commitment,Yang Tao, Xi Wang and Rui Zhang
- Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers,Takanori Yasuda, Yacheng Wang and Tsuyoshi Takagi
- COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers,Raymond K. Zhao, Ron Steinfeld and Amin Sakzad