Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACISP (25. : 2020 : Perth, Western Australia; Online) Information security and privacy
1. Verfasser: Lu, Jinyu (VerfasserIn)
Weitere Verfasser: Liu, Yunwen (VerfasserIn), Ashur, Tomer (VerfasserIn), Sun, Bing (VerfasserIn), Li, Chao (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
SKCN: Practical and Flexible Digital Signature from Module Lattice 2020 Gong, Boru
Optimized Arithmetic Operations for Isogeny-Based Cryptography on Huff Curves 2020 Huang, Yan
Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers 2020 Lu, Jinyu
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption 2020 Chatterjee, Sanjit
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme 2020 Tezuka, Masayuki
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol 2020 Zhao, Xiaopeng
Multi-input Laconic Function Evaluation 2020 Pang, Bo
Arbitrary-Centered Discrete Gaussian Sampling over the Integers 2020 Du, Yusong
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation 2020 Kim, Bedeuro
Design and Evaluation of Enumeration Attacks on Package Tracking Systems 2020 Jang, Hanbin
Secure and Compact Elliptic Curve LR Scalar Multiplication 2020 Jin, Yaoan
Unlinkable Updatable Databases and Oblivious Transfer with Access Control 2020 Damodaran, Aditya
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications 2020 Liu, Xiangyu
A New Improved AES S-box with Enhanced Properties 2020 Nitaj, Abderrahmane
Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers 2020 Koike, Yuji
SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition 2020 Chen, Jinrong
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks 2020 Ma, Zuchao
Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices 2020 Li, Linyu
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis 2020 Baksi, Anubhab
User Identity Linkage Across Social Networks via Community Preserving Network Embedding 2020 Guo, Xiaoyu
Alle Artikel auflisten