Looking Back - My Life as a Mathematician and Cryptographer
|
2020 |
Stinson, Douglas R. |
Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition
|
2020 |
Derbez, Patrick |
Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack
|
2020 |
Biham, Eli |
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
|
2020 |
Todo, Yosuke |
Block-Anti-Circulant Unbalanced Oil and Vinegar
|
2020 |
Szepieniec, Alan |
Towards Practical GGM-Based PRF from (Module-)Learning-with-Rounding
|
2020 |
Chuengsatiansup, Chitchanok |
Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AES
|
2020 |
Grassi, Lorenzo |
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
|
2020 |
Li, Chaoyun |
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
|
2020 |
Jager, Tibor |
An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks
|
2020 |
Muroi, Akifumi |
A Lightweight Alternative to PMAC
|
2020 |
Minematsu, Kazuhiko |
Ternary Syndrome Decoding with Large Weight
|
2020 |
Bricout, Rémi |
Exploring Trade-offs in Batch Bounded Distance Decoding
|
2020 |
Albrecht, Martin R. |
A DFA Attack on White-Box Implementations of AES with External Encodings
|
2020 |
Amadori, Alessandro |
XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V
|
2020 |
Wang, Wen |
Plaintext Recovery Attacks Against XTS Beyond Collisions
|
2020 |
Isobe, Takanori |
Block Ciphers and Permutations of Variants of FRIT
|
2020 |
Dobraunig, Christoph |
Towards a Practical Cluster Analysis over Encrypted Data
|
2020 |
Cheon, Jung Hee |
A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules
|
2020 |
Lee, Jung-Keun |
Using TopGear in Overdrive: A More Efficient ZKPoK for SPDZ
|
2020 |
Baum, Carsten |