A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis
|
2022 |
Sun, Ling |
Information-Combining Differential Fault Attacks on DEFAULT
|
2022 |
Nageler, Marcel |
MITAKA: A Simpler, Parallelizable, Maskable Variant of FALCON
|
2022 |
Espitau, Thomas |
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering
|
2022 |
Chen, Yilei |
Post-Quantum Security of the Even-Mansour Cipher
|
2022 |
Alagic, Gorjan |
On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography
|
2022 |
Ducas, Léo |
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms
|
2022 |
Tang, Gang |
Authentication in the Bounded Storage Model
|
2022 |
Dodis, Yevgeniy |
Secure Non-interactive Reduction and Spectral Analysis of Correlations
|
2022 |
Agarwal, Pratyush |
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2
|
2022 |
Amzaleg, Dor |
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha
|
2022 |
Dey, Sabyasachi |
Constant-Round Blind Classical Verification of Quantum Sampling
|
2022 |
Chung, Kai-Min |
Approximate Divisor Multiples — Factoring with Only a Third of the Secret CRT-Exponents
|
2022 |
May, Alexander |
Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical
|
2022 |
Gao, Si |
A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators
|
2022 |
Gao, Si |
Anonymous, Robust Post-quantum Public Key Encryption
|
2022 |
Grubbs, Paul |
McEliece Needs a Break — Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD
|
2022 |
Esser, Andre |
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks
|
2022 |
Dong, Xiaoyang |
A Correlation Attack on Full SNOW-V and SNOW-Vi
|
2022 |
Shi, Zhen |
Private Circuits with Quasilinear Randomness
|
2022 |
Ishai, Vipul Goyal. Yuval |