Supersingular Isogeny Key Exchange for Beginners
|
2020 |
Costello, Craig |
Iterative Differential Characteristic of TRIFLE-BC
|
2020 |
Liu, Fukang |
Tight Security Bounds for Generic Stream Cipher Constructions
|
2020 |
Hamann, Matthias |
A Timing Attack on the HQC Encryption Scheme
|
2020 |
Paiva, Thales Bandiera |
Parallelizable Authenticated Encryption with Small State Size
|
2020 |
Inoue, Akiko |
Plaintext Recovery Attacks Against XTS Beyond Collisions
|
2020 |
Isobe, Takanori |
Block Ciphers and Permutations of Variants of FRIT
|
2020 |
Dobraunig, Christoph |
Towards a Practical Cluster Analysis over Encrypted Data
|
2020 |
Cheon, Jung Hee |
A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules
|
2020 |
Lee, Jung-Keun |
Using TopGear in Overdrive: A More Efficient ZKPoK for SPDZ
|
2020 |
Baum, Carsten |
On Quantum Slide Attacks
|
2020 |
Bonnetain, Xavier |
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recoverv
|
2020 |
Hettwer, Benjamin |
BBQ: Using AES in Picnic Signatures
|
2020 |
Guilhem, Cyprien Delpech de Saint |
Looking Back - My Life as a Mathematician and Cryptographer
|
2020 |
Stinson, Douglas R. |
Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition
|
2020 |
Derbez, Patrick |
Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack
|
2020 |
Biham, Eli |
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
|
2020 |
Todo, Yosuke |
Block-Anti-Circulant Unbalanced Oil and Vinegar
|
2020 |
Szepieniec, Alan |
Towards Practical GGM-Based PRF from (Module-)Learning-with-Rounding
|
2020 |
Chuengsatiansup, Chitchanok |
Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AES
|
2020 |
Grassi, Lorenzo |