Benchmarking Post-quantum Cryptography in TLS
|
2020 |
Paquin, Christian |
LegRoast: Efficient Post-quantum Signatures from the Legendre PRF
|
2020 |
Beullens, Ward |
Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol
|
2020 |
Cozzo, Daniele |
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers
|
2020 |
Zhao, Raymond K. |
Practical Cryptanalysis of k-ary C*
|
2020 |
Smith-Tone, Daniel |
Multivariate Encryption Schemes Based on Polynomial Equations over Real Number
|
2020 |
Yasuda, Takanori |
Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption
|
2020 |
Santoso, Bagus |
A Rank Attack Against Extension Field Cancellation
|
2020 |
Smith-Tone, Daniel |
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms
|
2020 |
Häner, Thomas |
On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability
|
2020 |
Hodzic, Samir |
About Low DFR for QC-MDPC Decoding
|
2020 |
Sendrier, Nicolas |
QC-MDPC Decoders with Several Shades of Gray
|
2020 |
Drucker, Nir |
The Supersingular Isogeny Problem in Genus 2 and Beyond
|
2020 |
Costello, Craig |
Decryption Failure Is More Likely After Success
|
2020 |
Bindel, Nina |
Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions
|
2020 |
Bootle, Jonathan |
Randomized Decoding of Gabidulin Codes Beyond the Unique Decoding Radius
|
2020 |
Renner, Julian |
Isochronous Gaussian Sampling: From Inception to Implementation: With Applications to the Falcon Signature Scheme
|
2020 |
Howe, James |
CSIDH on the Surface
|
2020 |
Castryck, Wouter |
Defeating NewHope with a Single Trace
|
2020 |
Amiet, Dorian |
Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy
|
2020 |
Boschini, Cecilia |