Approximate Divisor Multiples — Factoring with Only a Third of the Secret CRT-Exponents
|
2022 |
May, Alexander |
Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical
|
2022 |
Gao, Si |
A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators
|
2022 |
Gao, Si |
Anonymous, Robust Post-quantum Public Key Encryption
|
2022 |
Grubbs, Paul |
McEliece Needs a Break — Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD
|
2022 |
Esser, Andre |
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks
|
2022 |
Dong, Xiaoyang |
A Correlation Attack on Full SNOW-V and SNOW-Vi
|
2022 |
Shi, Zhen |
Private Circuits with Quasilinear Randomness
|
2022 |
Ishai, Vipul Goyal. Yuval |
Orientations and the Supersingular Endomorphism Ring Problem
|
2022 |
Wesolowski, Benjamin |
Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes
|
2022 |
Bonnetain, Xavier |
Anonymity of NIST POC Round 3 KEMs
|
2022 |
Xagawa, Keita |
Non-malleable Commitments Against Quantum Attacks
|
2022 |
Bitansky, Nir |
Watermarking PRFs Against Quantum Adversaries
|
2022 |
Kitagawa, Fuyuki |
On IND-qCCA Security in the ROM and Its Applications: CPA Security Is Sufficient for TLS 1.3
|
2022 |
Huguenin-Dumittan, Lois |
Online-Extractability in the Quantum Random-Oracle Model
|
2022 |
Don, Jelle |
Secure Non-interactive Simulation: Feasibility and Rate
|
2022 |
Khorasgani, Hamidreza Amini |
A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis
|
2022 |
Sun, Ling |
Information-Combining Differential Fault Attacks on DEFAULT
|
2022 |
Nageler, Marcel |
MITAKA: A Simpler, Parallelizable, Maskable Variant of FALCON
|
2022 |
Espitau, Thomas |
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering
|
2022 |
Chen, Yilei |