Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
|
2022 |
Cao, Weiqgiong |
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
|
2022 |
Cui, Jiamin |
Side-Channeling the Kalyna Key Expansion
|
2022 |
Chuengsatiansup, Chitchanok |
A New Adaptive Attack on SIDH
|
2022 |
Fouotsa, Tako Boris |
Dynamic Universal Accumulator with Batch Update over Bilinear Groups
|
2022 |
Vitto, Giuseppe |
FASTA — A Stream Cipher for Fast FHE Evaluation
|
2022 |
Cid, Carlos |
Robust Subgroup Multi-signatures for Consensus
|
2022 |
Galindo, David |
Private Liquidity Matching Using MPC
|
2022 |
Atapoor, Shahla |
Attacks on Pseudo Random Number Generators Hiding a Linear Structure
|
2022 |
Martinez, Florette |
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEBAD M1/M3
|
2022 |
Fan, Yanhong |
On Fingerprinting Attacks and Length-Hiding Encryption
|
2022 |
Gellert, Kai |
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices
|
2022 |
Mukhtar, Naila |
Multicast Key Agreement, Revisited
|
2022 |
Bienstock, Alexander |
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption
|
2022 |
Chevallier-Mames, Benoît |
Faster Isogenies for Post-quantum Cryptography: SIKE
|
2022 |
Elkhatib, Rami |
CCA Secure A Posteriori Openable Encryption in the Standard Model
|
2022 |
Bultel, Xavier |
Adaptively Secure Laconic Function Evaluation for NC1
|
2022 |
Rosie, Răzvan |
New Attacks from Old Distinguishers Improved Attacks on Serpent
|
2022 |
Broll, Marek |
Subversion-Resilient Enhanced Privacy ID
|
2022 |
Faonio, Antonio |
PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument
|
2022 |
Gjøsteen, Kristian |