Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
|
2021 |
Cui, Tingting |
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
|
2021 |
Komlo, Chelsea |
Unintended Features of APIs: Cryptanalysis of Incremental HMAC
|
2021 |
Benmocha, Gal |
Not Enough LESS: An Improved Algorithm for Solving Code Equivalence Problems over Fq
|
2021 |
Beullens, Ward |
Practical Isogeny-Based Key-Exchange with Optimal Tightness
|
2021 |
Kock, Bor de |
Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations
|
2021 |
Gohr, Aron |
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher
|
2021 |
Banik, Subhadeep |
On Self-equivalence Encodings in White-Box Implementations
|
2021 |
Ranea, Adrián |
Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments
|
2021 |
Kuchta, Veronika |
Obfuscating Finite Automata
|
2021 |
Galbraith, Steven D. |
On Index Calculus Algorithms for Subfield Curves
|
2021 |
Galbraith, Steven D. |
Weak-Key Distinguishers for AES
|
2021 |
Grassi, Lorenzo |
Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath
|
2021 |
Indrøy, John Petter |
Boolean Ring Cryptographic Equation Solving
|
2021 |
Murphy, Sean |
Towards Post-Quantum Security for Signal’s X3DH Handshake
|
2021 |
Brendel, Jacqueline |
PRINCEv2: More Security for (Almost) No Overhead
|
2021 |
Božilov, Dušan |
On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis
|
2021 |
Perin, Guilherme |
Correlation Power Analysis and Higher-Order Masking Implementation of WAGE
|
2021 |
Fei, Yunsi |
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions
|
2021 |
Cheng, Hao |
Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAM
|
2021 |
Takeshita, Jonathan |