SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies
|
2020 |
Feo, Luca De |
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security
|
2020 |
Libert, Benoît |
Circular Security Is Complete for KDM Security
|
2020 |
Kitagawa, Fuyuki |
Post-Quantum Verification of Fujisaki-Okamoto
|
2020 |
Unruh, Dominique |
A New Decryption Failure Attack Against HQC
|
2020 |
Guo, Qian |
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
|
2020 |
Eichlseder, Maria |
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems
|
2020 |
Bardet, Magali |
Lower Bounds on the Degree of Block Ciphers
|
2020 |
Hebborn, Phil |
Minimizing the Two-Round Tweakable Even-Mansour Cipher
|
2020 |
Dutta, Avijit |
Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs
|
2020 |
Choi, Wonseok |
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?
|
2020 |
Wang, Weijia |
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness
|
2020 |
Hosoyamada, Akinori |
Security Reductions for White-Box Key-Storage in Mobile Payments
|
2020 |
Bock, Estuardo Alpirez |
A Bit-Vector Differential Model for the Modular Addition by a Constant
|
2020 |
Azimi, Seyyed Arash |
Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation
|
2020 |
Wu, Yusai |
SILVER — Statistical Independence and Leakage Verification
|
2020 |
Knichel, David |
Side Channel Information Set Decoding Using Iterative Chunking: Plaintext Recovery from the “Classic McEliece” Hardware Reference Implementation
|
2020 |
Lahr, Norman |
New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions
|
2020 |
Gutiérrez, Antonio Flórez |
Public-Key Generation with Verifiable Randomness
|
2020 |
Blazy, Olivier |
CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors
|
2020 |
Cini, Valerio |