Delegating Supersingular Isogenies over F p2 with Cryptographic Applications
|
2022 |
Pedersen, Robi |
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability
|
2022 |
Joshi, Snehil |
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods
|
2022 |
Yamamura, Kazuki |
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems
|
2022 |
Wei, Congming |
Improved See-In-The-Middle Attacks on AES
|
2022 |
Park, Jonghyun |
Grover on SM3
|
2022 |
Song, Gyeongju |
Differential Fault Attack on Lightweight Block Cipher PIPO
|
2022 |
Lim, Seonghyuck |
Forward Secure Message Franking
|
2022 |
Yamamuro, Hiroki |
Revocable Hierarchical Identity-Based Authenticated Key Exchange
|
2022 |
Okano, Yuki |
Improved Lattice-Based Mix-Nets for Electronic Voting
|
2022 |
Farzaliyev, Valeh |
Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice
|
2022 |
Ren, Peixin |
Compiler-based Attack Origin Tracking with Dynamic Taint Analysis
|
2022 |
Braunsdorf, Oliver |
A Preimage Attack on Reduced GIMLI- HASH
|
2022 |
Lee, Yongseong |
Differential Fault Attack on Rocca
|
2022 |
Anand, Ravi |
T—depth Reduction Method for Efficient SHA—256 Quantum Circuit Construction
|
2022 |
Lee, Jongheon |
SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3
|
2022 |
Kim, Hyunjun |
Towards Witness Encryption Without Multilinear Maps
|
2022 |
Choi, Gwangbae |
Designated-Verifier Linkable Ring Signatures
|
2022 |
Behrouz, Pourandokht |
Algebraic Attacks on Grain-Like Keystream Generators
|
2022 |
Beighton, Matthew |
Learning-based Side-Channel Analysis on PIPO
|
2022 |
Woo, Ji-Eun |