Panther: A Sponge Based Lightweight Authenticated Encryption Scheme
|
2021 |
Bhargavi, K. V. L. |
Sequential Indifferentiability of Confusion-Diffusion Networks
|
2021 |
Da, Qi |
Improving First-Order Threshold Implementations of SKINNY
|
2021 |
Caforio, Andrea |
Fault-Enabled Chosen-Ciphertext Attacks on Kyber
|
2021 |
Hermelink, Julius |
Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures
|
2021 |
Shaw, Surbhi |
Time-Release Cryptography from Minimal Circuit Assumptions
|
2021 |
Jaques, Samuel |
Crooked Indifferentiability of Enveloped XOR Revisited
|
2021 |
Bhattacharyya, Rishiraj |
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
|
2021 |
Chakraborti, Avik |
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes
|
2021 |
Lu, Zhenyu |
Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization
|
2021 |
Russon, Andy |
Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain
|
2021 |
Nuta, Seiya |
Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting
|
2021 |
Chatterjee, Sanjit |
Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE
|
2021 |
Kumaraswamy, Deepak |
Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation
|
2021 |
Toyoda, Kodai |
Succinct Publicly-Certifiable Proofs: Or, Can a Blockchain Verify a Designated-Verifier Proof?
|
2021 |
Campanelli, Matteo |
Revisiting the Security of COMET Authenticated Encryption Scheme
|
2021 |
Gueron, Shay |
tHyENA: Making HyENA Even Smaller
|
2021 |
Chakraborti, Avik |
Three Input Exclusive-OR Gate Support for Boyar-Peralta’s Algorithm
|
2021 |
Baksi, Anubhab |
Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover’s Attacks
|
2021 |
Anand, Ravi |
Analyzing Masked Ciphers Against Transition and Coupling Effects
|
2021 |
Dhooghe, Siemen |