International Association for Cryptologic Research

International Association
for Cryptologic Research

Asiacrypt 2025

Asiacrypt 2025 Artifacts


Artifacts

Adversary Resilient Learned Bloom Filters
Ghada Almashaqbeh, Allison Bishop, and Hayder Tirmazi

Worst-Case Lattice Sampler with Truncated Gadgets and Applications
Corentin Jeudy and Olivier Sanders

Integral cryptanalysis in characteristic p
Michiel Verbauwhede and Tim Beyne

A Crack in the Firmament: Restoring Soundness of the Orion Proof System and More
Thomas den Hollander and Daniel Slamanig

Scalable zkSNARKs for Matrix Computations: A Generic Framework for Verifiable Deep Learning
Mingshu Cong, Sherman S. M. Chow, Siu-Ming Yiu, and Tsz Hon Yuen

Qlapoti: Simple and Efficient Translation of Quaternion Ideals to Isogenies
Giacomo Borin, Maria Corte-Real Santos, Jonathan Komada Eriksen, Riccardo Invernizzi, Marzio Mula, Sina Schaeffler, and Frederik Vercauteren

On Wagner’s k-Tree Algorithm Over Integers
Haoxing Lin and Prashant Nalini Vasudevan

Enhancing the DATF Technique in Differential-Linear Cryptanalysis
Cheng Che and Tian Tian

Predicting Module-Lattice Reduction
Léo Ducas, Lynn Engelberts, and Paola de Perthuis

VOLE-in-the-Head Signatures from Subfield Bilinear Collisions
Janik Huth and Antoine Joux

Accelerating TFHE with Sorted-Bootstrapping Techniques
Loris Bergerat, Jean-Baptiste Orfila, Adeline Roux-Langlois, and Samuel Tap

Pseudorandom Correlation Generators for Multiparty Beaver Triples over $\mathbb{F}_2$
Peihan Miao, Alice Murphy, Akshayaram Srinivasan, and Max Tromanhauser

Practical Cryptanalysis of Pseudorandom Correlation Generators Based on Quasi-abelian Syndrome Decoding
Charles Bouillaguet, Claire Delaplace, Mickaël Hamdad, and Damien Vergnaud

On the Provable Dual Attack for LWE by Modulus Switching
Hongyuan Qu and Guangwu Xu

LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram
Tomoki Moriya and Miha Stopar

Towards a Modern LLL Implementation
Léo Ducas, Ludo N. Pulles, and Marc Stevens

Vectorial Fast Correlation Attacks
Bin Zhang, Ruitao Liu, Willi Meier, Siwei Sun, Dengguo Feng, and Wenling Wu

Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical
Alexander Karenin, Elena Kirshanova, Julian Nowakowski, and Alexander May

Fast Pseudorandom Correlation Functions from Sparse LPN
Lennart Braun, Geoffroy Couteau, Kelsey Melissaris, Mahshid Riahinia, and Elahe Sadeghi

Masked Circuit Compiler in the Cardinal Random Probing Composability Framework
Sonia Belaïd, Victor Normand, and Matthieu Rivain

Solving Concealed ILWE and Its Application for Breaking Masked Dilithium
Simon Damm, Asja Fischer, Alexander May, Soundes Marzougui, Leander Schwarz, Henning Seidler, Jean-Pierre Seifert, Jonas Thietke, and Vincent Quentin Ulitzsch

Format-Preserving Compression-Tolerating Authenticated Encryption for Images
Alexandra Boldyreva, Kaishuo Cheng, and Jehad Hussein

New Framework for Structure-Aware PSI From Distributed Function Secret Sharing
Dung Bui, Gayathri Garimella, Peihan Miao, and Phuoc Van Long Pham




Asiacrypt 2025 Artifact Evaluation Committee

Artifact Chair:

Artifact Evaluation Committee Members:


Scope and Aims

The two main goals of the artifact review process was to improve functionality and reusability of artifacts to enable reproduction and extension by the scientific community. Reproducibility, in the context of computational experiments, means that the scientific results claimed can be obtained by a different team using the original authors' artifacts. The artifact review process did not include attempting to reproduce the experiment and to verify the scientific claims in the accepted paper.

For more information, please see the Asiarypt 2025 Call for Artifacts.