Looking Back - My Life as a Mathematician and Cryptographer
|
2020 |
Stinson, Douglas R. |
Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition
|
2020 |
Derbez, Patrick |
Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack
|
2020 |
Biham, Eli |
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
|
2020 |
Todo, Yosuke |
Block-Anti-Circulant Unbalanced Oil and Vinegar
|
2020 |
Szepieniec, Alan |
Towards Practical GGM-Based PRF from (Module-)Learning-with-Rounding
|
2020 |
Chuengsatiansup, Chitchanok |
Supersingular Isogeny Key Exchange for Beginners
|
2020 |
Costello, Craig |
Iterative Differential Characteristic of TRIFLE-BC
|
2020 |
Liu, Fukang |
Tight Security Bounds for Generic Stream Cipher Constructions
|
2020 |
Hamann, Matthias |
A Timing Attack on the HQC Encryption Scheme
|
2020 |
Paiva, Thales Bandiera |
Parallelizable Authenticated Encryption with Small State Size
|
2020 |
Inoue, Akiko |
Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AES
|
2020 |
Grassi, Lorenzo |
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
|
2020 |
Li, Chaoyun |
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
|
2020 |
Jager, Tibor |
An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks
|
2020 |
Muroi, Akifumi |
A Lightweight Alternative to PMAC
|
2020 |
Minematsu, Kazuhiko |
Ternary Syndrome Decoding with Large Weight
|
2020 |
Bricout, Rémi |
Exploring Trade-offs in Batch Bounded Distance Decoding
|
2020 |
Albrecht, Martin R. |
A DFA Attack on White-Box Implementations of AES with External Encodings
|
2020 |
Amadori, Alessandro |
XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V
|
2020 |
Wang, Wen |