| 2022 | A New Adaptive Attack on SIDH. Tako Boris Fouotsa, Christophe Petit |
| 2022 | A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption. Benoît Chevallier-Mames |
| 2022 | Adaptively Secure Laconic Function Evaluation for NC Razvan Rosie |
| 2022 | Approximate Homomorphic Encryption with Reduced Approximation Error. Andrey Kim, Antonis Papadimitriou, Yuriy Polyakov |
| 2022 | Attacks on Pseudo Random Number Generators Hiding a Linear Structure. Florette Martinez |
| 2022 | CCA Secure A Posteriori Openable Encryption in the Standard Model. Xavier Bultel |
| 2022 | Dynamic Universal Accumulator with Batch Update over Bilinear Groups. Giuseppe Vitto, Alex Biryukov |
| 2022 | FASTA - A Stream Cipher for Fast FHE Evaluation. Carlos Cid, John Petter Indrøy, Håvard Raddum |
| 2022 | Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong |
| 2022 | Faster Isogenies for Post-quantum Cryptography: SIKE. Rami Elkhatib, Brian Koziel, Reza Azarderakhsh |
| 2022 | Fully Projective Radical Isogenies in Constant-Time. Jesús-Javier Chi-Domínguez, Krijn Reijnders |
| 2022 | Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128. Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang |
| 2022 | Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA. Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu |
| 2022 | More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes. Han Wu, Guangwu Xu |
| 2022 | Multicast Key Agreement, Revisited. Alexander Bienstock, Yevgeniy Dodis, Yi Tang |
| 2022 | New Attacks from Old Distinguishers Improved Attacks on Serpent. Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo |
| 2022 | On Fingerprinting Attacks and Length-Hiding Encryption. Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten |
| 2022 | Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function. Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz |
| 2022 | PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument. Kristian Gjøsteen, Mayank Raikwar, Shuang Wu |
| 2022 | Private Liquidity Matching Using MPC. Shahla Atapoor, Nigel P. Smart, Younes Talibi Alaoui |
| 2022 | Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3. Yanhong Fan, Muzhou Li, Chao Niu, Zhenyu Lu, Meiqin Wang |
| 2022 | Robust Subgroup Multi-signatures for Consensus. David Galindo, Jia Liu |
| 2022 | Side-Channeling the Kalyna Key Expansion. Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom, Zhiyuan Zhang |
| 2022 | Subversion-Resilient Enhanced Privacy ID. Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente |
| 2022 | Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings Steven D. Galbraith |