Asiacrypt 2025
Asiacrypt 2025 Artifacts
Artifacts
Adversary Resilient Learned Bloom Filters
Ghada Almashaqbeh, Allison Bishop, and Hayder Tirmazi
Worst-Case Lattice Sampler with Truncated Gadgets and Applications
Corentin Jeudy and Olivier Sanders
Integral cryptanalysis in characteristic p
Michiel Verbauwhede and Tim Beyne
A Crack in the Firmament: Restoring Soundness of the Orion Proof System and More
Thomas den Hollander and Daniel Slamanig
Scalable zkSNARKs for Matrix Computations: A Generic Framework for Verifiable Deep Learning
Mingshu Cong, Sherman S. M. Chow, Siu-Ming Yiu, and Tsz Hon Yuen
Qlapoti: Simple and Efficient Translation of Quaternion Ideals to Isogenies
Giacomo Borin, Maria Corte-Real Santos, Jonathan Komada Eriksen, Riccardo Invernizzi, Marzio Mula, Sina Schaeffler, and Frederik Vercauteren
On Wagner’s k-Tree Algorithm Over Integers
Haoxing Lin and Prashant Nalini Vasudevan
Enhancing the DATF Technique in Differential-Linear Cryptanalysis
Cheng Che and Tian Tian
Predicting Module-Lattice Reduction
Léo Ducas, Lynn Engelberts, and Paola de Perthuis
VOLE-in-the-Head Signatures from Subfield Bilinear Collisions
Janik Huth and Antoine Joux
Accelerating TFHE with Sorted-Bootstrapping Techniques
Loris Bergerat, Jean-Baptiste Orfila, Adeline Roux-Langlois, and Samuel Tap
Pseudorandom Correlation Generators for Multiparty Beaver Triples over $\mathbb{F}_2$
Peihan Miao, Alice Murphy, Akshayaram Srinivasan, and Max Tromanhauser
Practical Cryptanalysis of Pseudorandom Correlation Generators Based on Quasi-abelian Syndrome Decoding
Charles Bouillaguet, Claire Delaplace, Mickaël Hamdad, and Damien Vergnaud
On the Provable Dual Attack for LWE by Modulus Switching
Hongyuan Qu and Guangwu Xu
LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram
Tomoki Moriya and Miha Stopar
Towards a Modern LLL Implementation
Léo Ducas, Ludo N. Pulles, and Marc Stevens
Vectorial Fast Correlation Attacks
Bin Zhang, Ruitao Liu, Willi Meier, Siwei Sun, Dengguo Feng, and Wenling Wu
Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical
Alexander Karenin, Elena Kirshanova, Julian Nowakowski, and Alexander May
Fast Pseudorandom Correlation Functions from Sparse LPN
Lennart Braun, Geoffroy Couteau, Kelsey Melissaris, Mahshid Riahinia, and Elahe Sadeghi
Masked Circuit Compiler in the Cardinal Random Probing Composability Framework
Sonia Belaïd, Victor Normand, and Matthieu Rivain
Solving Concealed ILWE and Its Application for Breaking Masked Dilithium
Simon Damm, Asja Fischer, Alexander May, Soundes Marzougui, Leander Schwarz, Henning Seidler, Jean-Pierre Seifert, Jonas Thietke, and Vincent Quentin Ulitzsch
Format-Preserving Compression-Tolerating Authenticated Encryption for Images
Alexandra Boldyreva, Kaishuo Cheng, and Jehad Hussein
New Framework for Structure-Aware PSI From Distributed Function Secret Sharing
Dung Bui, Gayathri Garimella, Peihan Miao, and Phuoc Van Long Pham
Asiacrypt 2025 Artifact Evaluation Committee
Artifact Chair:
- Markku-Juhani O. Saarinen (Tampere University, Finland)
Artifact Evaluation Committee Members:
- Sebastiano Boscardin (Eindhoven University of Technology, Netherlands)
- Charles Bouillaguet (Sorbonne University, France)
- Eros Camacho-Ruiz (Instituto de Microelectrónica de Sevilla, Spain)
- Fabrizio De Santis (Siemens AG, Germany)
- Matthias Kannwischer (Chelpis Quantum Corporation, Taiwan)
- Katharina Koschatko (Graz University of Technology, Austria)
- Pablo Navarro-Torrero (Instituto de Microelectrónica de Sevilla, Spain)
- Reyhaneh Rabbaninejad (Tampere University, Finland)
- Krijn Reijnders (KU Leuven, Belgium)
- Sachin Shukla (Microsoft, United States)
- Mohamed Soliman (Tampere University, Finland)
- Mert Yassi (Monash University, Australia)
Scope and Aims
The two main goals of the artifact review process was to improve functionality and reusability of artifacts to enable reproduction and extension by the scientific community. Reproducibility, in the context of computational experiments, means that the scientific results claimed can be obtained by a different team using the original authors' artifacts. The artifact review process did not include attempting to reproduce the experiment and to verify the scientific claims in the accepted paper.
For more information, please see the Asiarypt 2025 Call for Artifacts.