Mind the Propagation of States: New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ASIACRYPT (26. : 2020 : Online) Advances in cryptology - ASIACRYPT 2020 ; Part 1
1. Verfasser: Hu, Xichao (VerfasserIn)
Weitere Verfasser: Li, Yongqiang (VerfasserIn), Jiao, Lin (VerfasserIn), Tian, Shizhu (VerfasserIn), Wang, Mingsheng (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies 2020 Feo, Luca De
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security 2020 Libert, Benoît
Circular Security Is Complete for KDM Security 2020 Kitagawa, Fuyuki
Post-Quantum Verification of Fujisaki-Okamoto 2020 Unruh, Dominique
A New Decryption Failure Attack Against HQC 2020 Guo, Qian
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC 2020 Eichlseder, Maria
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems 2020 Bardet, Magali
Lower Bounds on the Degree of Block Ciphers 2020 Hebborn, Phil
Minimizing the Two-Round Tweakable Even-Mansour Cipher 2020 Dutta, Avijit
Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs 2020 Choi, Wonseok
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking? 2020 Wang, Weijia
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness 2020 Hosoyamada, Akinori
Security Reductions for White-Box Key-Storage in Mobile Payments 2020 Bock, Estuardo Alpirez
A Bit-Vector Differential Model for the Modular Addition by a Constant 2020 Azimi, Seyyed Arash
Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation 2020 Wu, Yusai
SILVER — Statistical Independence and Leakage Verification 2020 Knichel, David
Side Channel Information Set Decoding Using Iterative Chunking: Plaintext Recovery from the “Classic McEliece” Hardware Reference Implementation 2020 Lahr, Norman
New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions 2020 Gutiérrez, Antonio Flórez
Public-Key Generation with Verifiable Randomness 2020 Blazy, Olivier
CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors 2020 Cini, Valerio
Alle Artikel auflisten