Finding closest lattice vectors using approximate Voronoi cells.- Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign.- Forward-Secure Group Signatures from Lattices.- Towards Practical Microcontroller Implementation of the Signature Scheme Falcon.- Round5: Compact and Fast Post-Quantum Public-Key Encryption.- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes.- Direct CCA-Secure KEM and Deterministic PKE from Plain LWE.- Recovering short secret keys of RLCE in polynomial time.- Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15.- On the Complexity of Superdetermined Minrank Instances.- Constant-Round Group Key Exchange from the Ring-RLWE Assumption.- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model.- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.- Faster SeaSign signatures through improved rejection sampling.- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography.- On Lions and Elligators: An efficient constant-time implementation of CSIDH.- Quantum security of hash functions and property-preservation of iterated hashing.- Improved Quantum Multicollision-Finding Algorithm.- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes.- A traceable ring signature scheme based on coding theory.- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders.