Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
|
2021 |
Cui, Tingting |
Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAM
|
2021 |
Takeshita, Jonathan |
Improved (Related-key) Differential Cryptanalysis on GIFT
|
2021 |
Ji, Fulei |
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
|
2021 |
Roy, Arnab |
Low-Gate Quantum Golden Collision Finding
|
2021 |
Jaques, Samuel |
Improvements to Quantum Search Techniques for Block-Ciphers, with Applications to AES
|
2021 |
Davenport, James H. |
Trapdoor DDH Groups from Pairings and Isogenies
|
2021 |
Kutas, Péter |
Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
|
2021 |
Andreeva, Elena |
Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
|
2021 |
Fraser, Ashley |
Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments
|
2021 |
Kuchta, Veronika |
Obfuscating Finite Automata
|
2021 |
Galbraith, Steven D. |
On Index Calculus Algorithms for Subfield Curves
|
2021 |
Galbraith, Steven D. |
Weak-Key Distinguishers for AES
|
2021 |
Grassi, Lorenzo |
Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath
|
2021 |
Indrøy, John Petter |
Boolean Ring Cryptographic Equation Solving
|
2021 |
Murphy, Sean |
Towards Post-Quantum Security for Signal’s X3DH Handshake
|
2021 |
Brendel, Jacqueline |
PRINCEv2: More Security for (Almost) No Overhead
|
2021 |
Božilov, Dušan |
On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis
|
2021 |
Perin, Guilherme |
Correlation Power Analysis and Higher-Order Masking Implementation of WAGE
|
2021 |
Fei, Yunsi |
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions
|
2021 |
Cheng, Hao |