Revisiting the Security of COMET Authenticated Encryption Scheme
|
2021 |
Gueron, Shay |
tHyENA: Making HyENA Even Smaller
|
2021 |
Chakraborti, Avik |
Three Input Exclusive-OR Gate Support for Boyar-Peralta’s Algorithm
|
2021 |
Baksi, Anubhab |
Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover’s Attacks
|
2021 |
Anand, Ravi |
Analyzing Masked Ciphers Against Transition and Coupling Effects
|
2021 |
Dhooghe, Siemen |
DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting
|
2021 |
Pedersen, Robi |
Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy
|
2021 |
Aaraj, Najwa |
On Elapsed Time Consensus Protocols
|
2021 |
Bowman, Mic |
Differential Fault Attack on Espresso
|
2021 |
Bathe, Bhagwan |
Smooth Zero-Knowledge Hash Functions
|
2021 |
Abdolmaleki, Behzad |
A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
|
2021 |
Abdulgadir, Abubakr |
Identity-Based Matchmaking Encryption Without Random Oracles
|
2021 |
Francati, Danilo |
Panther: A Sponge Based Lightweight Authenticated Encryption Scheme
|
2021 |
Bhargavi, K. V. L. |
Sequential Indifferentiability of Confusion-Diffusion Networks
|
2021 |
Da, Qi |
Improving First-Order Threshold Implementations of SKINNY
|
2021 |
Caforio, Andrea |
Fault-Enabled Chosen-Ciphertext Attacks on Kyber
|
2021 |
Hermelink, Julius |
Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures
|
2021 |
Shaw, Surbhi |
Time-Release Cryptography from Minimal Circuit Assumptions
|
2021 |
Jaques, Samuel |
Crooked Indifferentiability of Enveloped XOR Revisited
|
2021 |
Bhattacharyya, Rishiraj |
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
|
2021 |
Chakraborti, Avik |