A Complete Characterization of Plateaued Boolean Functions in Terms of Their Cayley Graphs.- Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications.- Ubiquitous Weak-key Classes of BRW-polynomial Function.- Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count.- Two Simple Composition Theorems with H-coefficients.- Improved Related-Tweakey Boomerang Attacks on Deoxys-BC.- SCA-Resistance for AES: How Cheap Can We Go.- Cryptanalysis of 1-Round KECCAK.- Performing Computations on Hierarchically Shared Secrets.- Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge.- Unified Formulas for Some Deterministic Almost-injective Encodings into Hyperelliptic Curves.- HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction.- Large FHE Gates from Tensored Homomorphic Accumulator.- Two-Face: New Public Key Multivariate Schemes.- Cryptanalysis of RSA Variants with Modidied Euler Quotient.- Saber: Module-LWR Based Key Exchange, CPA-secure Encryption and CCA-secure KEM.- Practical Fault Injection on Deterministic Signatures: The Case of EdDSA.- Authentication with Weaker Trust Assumptions for Voting Systems.- Shorter Double-authentication Preventing Signatures for Small Address Spaces.