Signatures of Knowledge for Boolean Circuits Under Standard Assumptions
|
2020 |
Baghery, Karim |
QA-NIZK Arguments of Same Opening for Bilateral Commitments
|
2020 |
Rafols, Carla |
MixColumns Coefficient Property and Security of the AES with A Secret S-Box
|
2020 |
An, Xin |
BBB Secure Nonce Based MAC Using Public Permutations
|
2020 |
Dutta, Avijit |
A SAT-Based Approach for Index Calculus on Binary Elliptic Curves
|
2020 |
Trimoska, Monika |
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
|
2020 |
Campos, Fabio |
Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP
|
2020 |
Doulgerakis, Emmanouil |
A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
|
2020 |
Micheli, Gabrielle De |
LESS is More: Code-Based Signatures Without Syndromes
|
2020 |
Biasse, Jean-François |
New Results on the SymSum Distinguisher on Round-Reduced SHA3
|
2020 |
Suryawanshi, Sahiba |
On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol
|
2020 |
Basso, Andrea |
Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression
|
2020 |
Kansal, Meenakshi |
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder
|
2020 |
Hutchinson, Aaron |
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
|
2020 |
Tolba, Mohamed |
UC Updatable Databases and Applications
|
2020 |
Damodaran, Aditya |
Online Template Attack on ECDSA: Extracting Keys via the Other Side
|
2020 |
Roelofs, Niels |
Cryptanalysis of FLExXAEAD
|
2020 |
Rahman, Mostafizar |
Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
|
2020 |
Yehia, Mahmoud |
When Similarities Among Devices are Taken for Granted: Another Look at Portability
|
2020 |
Rioja, Unai |
Attacking RSA Using an Arbitrary Parameter
|
2020 |
Ariffin, Muhammad Rezal Kamel |