ZKAttest: Ring and Group Signatures for Existing ECDSA Keys
|
2022 |
Faz-Hernández, Armando |
A Low-Randomness Second-Order Masked AES
|
2022 |
Beyne, Tim |
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application
|
2022 |
Xagawa, Keita |
Automated Truncation of Differential Trails and Trail Clustering in ARX
|
2022 |
Biryukov, Alex |
Quantum Boomerang Attacks and Some Applications
|
2022 |
Nayva-Plasencia,, Paul Frixons, Marta |
Simple and Memory-Efficient Signature Generation of XMSS MT
|
2022 |
Kosuge, Haruhisa |
Parallel Verification of Serial MAC and AE Modes
|
2022 |
Minematsu, Kazuhiko |
Improved Attacks on GIFT-64
|
2022 |
Sun, Ling |
Improved Quantum Algorithms for the k-XOR Problem
|
2022 |
Schrottenloher, André |
Secret Keys in Genus-2 SIDH
|
2022 |
Kunzweiler, Sabrina |
On Evaluating Anonymity of Onion Routing
|
2022 |
Melloni, Alessandro |
Revisiting Driver Anonymity in ORide
|
2022 |
Kumaraswamy, Deepak |
How Do the Arbiter PUFs Sample the Boolean Function Class?
|
2022 |
Roy, Animesh |
Multi-user Security of the Elephant v2 Authenticated Encryption Mode
|
2022 |
Beyne, Tim |
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR
|
2022 |
Todo, Yosuke |
MAYO: Practical Post-quantum Signatures from Oil-and-Vinegar Maps
|
2022 |
Beullens, Ward |
Zaytun: Lattice Based PKE and KEM with Shorter Ciphertexi Size
|
2022 |
Abla, Parhat |
A Polynomial Time Key-Recovery Attack on the Sidon Cryptosystem Verbel
|
2022 |
Briaud, Pierre |
Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDF
|
2022 |
Chavez-Saab, Jorge |
MPC for Q2 Access Structures over Rings and Fields
|
2022 |
Jadoul, Robin |