Revisiting the Security of COMET Authenticated Encryption Scheme
|
2021 |
Gueron, Shay |
tHyENA: Making HyENA Even Smaller
|
2021 |
Chakraborti, Avik |
Three Input Exclusive-OR Gate Support for Boyar-Peralta’s Algorithm
|
2021 |
Baksi, Anubhab |
Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover’s Attacks
|
2021 |
Anand, Ravi |
Analyzing Masked Ciphers Against Transition and Coupling Effects
|
2021 |
Dhooghe, Siemen |
DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting
|
2021 |
Pedersen, Robi |
Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy
|
2021 |
Aaraj, Najwa |
On Elapsed Time Consensus Protocols
|
2021 |
Bowman, Mic |
Crooked Indifferentiability of Enveloped XOR Revisited
|
2021 |
Bhattacharyya, Rishiraj |
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
|
2021 |
Chakraborti, Avik |
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes
|
2021 |
Lu, Zhenyu |
Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization
|
2021 |
Russon, Andy |
Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain
|
2021 |
Nuta, Seiya |
Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting
|
2021 |
Chatterjee, Sanjit |
Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE
|
2021 |
Kumaraswamy, Deepak |
Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation
|
2021 |
Toyoda, Kodai |
Succinct Publicly-Certifiable Proofs: Or, Can a Blockchain Verify a Designated-Verifier Proof?
|
2021 |
Campanelli, Matteo |
Differential Fault Attack on Espresso
|
2021 |
Bathe, Bhagwan |
Smooth Zero-Knowledge Hash Functions
|
2021 |
Abdolmaleki, Behzad |
A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
|
2021 |
Abdulgadir, Abubakr |