SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies
|
2020 |
Feo, Luca De |
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security
|
2020 |
Libert, Benoît |
Circular Security Is Complete for KDM Security
|
2020 |
Kitagawa, Fuyuki |
Post-Quantum Verification of Fujisaki-Okamoto
|
2020 |
Unruh, Dominique |
A New Decryption Failure Attack Against HQC
|
2020 |
Guo, Qian |
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
|
2020 |
Eichlseder, Maria |
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems
|
2020 |
Bardet, Magali |
Lower Bounds on the Degree of Block Ciphers
|
2020 |
Hebborn, Phil |
Minimizing the Two-Round Tweakable Even-Mansour Cipher
|
2020 |
Dutta, Avijit |
Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs
|
2020 |
Choi, Wonseok |
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?
|
2020 |
Wang, Weijia |
New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions
|
2020 |
Gutiérrez, Antonio Flórez |
Public-Key Generation with Verifiable Randomness
|
2020 |
Blazy, Olivier |
CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors
|
2020 |
Cini, Valerio |
Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications
|
2020 |
Katsumata, Shuichi |
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums
|
2020 |
Hu, Kai |
Mind the Propagation of States: New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions
|
2020 |
Hu, Xichao |
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption
|
2020 |
Mennink, Bart |
On the Adaptive Security of MACs and PRFs
|
2020 |
Morgan, Andrew |
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness
|
2020 |
Hosoyamada, Akinori |