Symmetric Key Cryptography.- The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher.- Known Key Attack on GIFT 64 and GIFT 64 Based on Correlation Matrices.- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers.- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers.- Tight Multi user Security of Ascon and Its Large Key Extension.- Differential Distinguishing Attacks on SNOWV, SNOWVi and KCipher2.- Efficient Search for Optimal Permutations of Refined TypeII Generalized Feistel Structures.- Homomorphic Encryption.- FFHEW High Precision Approximate Homomorphic Encryption with Batch Bootstrapping.- NTRU based FHE for Larger Key and Message Space.- An Efficient Integer-wise ReLU on TFHE.- HERatio Homomorphic Encryption of Rationals using Laurent polynomials.- TFHE Bootstrapping Faster Smaller and Time Space TradeOffs.- Approximate Methods for the Computation of Step Functions in Homomorphic Encryption.- Encryption and its Applications.- Key Cooperative Attribute-Based Encryption.- On the Feasibility of Identity based Encryption with Equality Test against Insider Attacks.- Non interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy.- On the Implication from Updatable Encryption to Public Key Cryptographic Primitives.- Continuous Version of Non malleable Codes from Authenticated Encryption.- Digital Signatures.- Pairing Free ID Based Signatures as Secure as Discrete Logarithm in AGM.- Threshold Ring Signatures with Accountability.- Threshold Signatures with Private Accountability via Secretly Designated Witnesses.- Cryptographic Primitives.- A Novel Window t NAF on Koblitz Curves.- Parallel Algorithms on Hyperelliptic Pairings using Hyperelliptic Nets.- AlgSAT a SAT Method for Verification of Differential Trails from an Algebraic Perspective.- Hadamard product argument from Lagrange-based univariate polynomials.