Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2
|
2022 |
Amzaleg, Dor |
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha
|
2022 |
Dey, Sabyasachi |
Constant-Round Blind Classical Verification of Quantum Sampling
|
2022 |
Chung, Kai-Min |
A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis
|
2022 |
Sun, Ling |
Information-Combining Differential Fault Attacks on DEFAULT
|
2022 |
Nageler, Marcel |
MITAKA: A Simpler, Parallelizable, Maskable Variant of FALCON
|
2022 |
Espitau, Thomas |
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering
|
2022 |
Chen, Yilei |
Post-Quantum Security of the Even-Mansour Cipher
|
2022 |
Alagic, Gorjan |
On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography
|
2022 |
Ducas, Léo |
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms
|
2022 |
Tang, Gang |
Authentication in the Bounded Storage Model
|
2022 |
Dodis, Yevgeniy |
Secure Non-interactive Reduction and Spectral Analysis of Correlations
|
2022 |
Agarwal, Pratyush |
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks
|
2022 |
Dong, Xiaoyang |
A Correlation Attack on Full SNOW-V and SNOW-Vi
|
2022 |
Shi, Zhen |
Private Circuits with Quasilinear Randomness
|
2022 |
Ishai, Vipul Goyal. Yuval |
Orientations and the Supersingular Endomorphism Ring Problem
|
2022 |
Wesolowski, Benjamin |
Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes
|
2022 |
Bonnetain, Xavier |
Anonymity of NIST POC Round 3 KEMs
|
2022 |
Xagawa, Keita |
Non-malleable Commitments Against Quantum Attacks
|
2022 |
Bitansky, Nir |
Watermarking PRFs Against Quantum Adversaries
|
2022 |
Kitagawa, Fuyuki |