Cryptanalysis: The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs.- Quasidifferential Saves Infeasible Differential Improved Weak-Key Key Recovery Attacks on Round-Reduced GIFT.- Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer.- Comprehensive Robustness Analysis of GCM, CCM, and OCB3.- Quantum Chosen-Ciphertext Attacks Based on Simon's Algorithm against Unified Structures.- Improved Key Recovery Attacks of Ascon. Public-Key Cryptography: DSKE: Digital Signatures with Key Extraction.- Simplified Adaptively Secure Threshold BLS Signatures.- Non-Interactive Threshold BBS+ From Pseudorandom Correlations.- Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Effcient Generic Construction. Hardware and Software Implementations: Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate- and Code-Based PQC.- Post-Quantum Online/Offine Signatures. Symmetric-Key Cryptography: How (not) to hash into class groups of imaginary quadratic fields.- Sequential Indifferentiability of 7-round Misty Structures. Multiparty Computation and Zero-Knowledge: Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors.- Universal Adaptor Signatures from Blackbox Multi-Party Computation. White-box Crypto: Affne Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher.