Differential Fault Attack on Lightweight Block Cipher PIPO
|
2022 |
Lim, Seonghyuck |
Forward Secure Message Franking
|
2022 |
Yamamuro, Hiroki |
Towards Witness Encryption Without Multilinear Maps
|
2022 |
Choi, Gwangbae |
Designated-Verifier Linkable Ring Signatures
|
2022 |
Behrouz, Pourandokht |
Algebraic Attacks on Grain-Like Keystream Generators
|
2022 |
Beighton, Matthew |
Learning-based Side-Channel Analysis on PIPO
|
2022 |
Woo, Ji-Eun |
Collision-Resistant and Pseudorandom Function Based on Merkle-Damgärd Hash Function
|
2022 |
Hirose, Shoichi |
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems
|
2022 |
Ding, Lin |
Efficient Quantum Circuit of Proth Number Modular Multiplication
|
2022 |
Jeon, Chanho |
Delegating Supersingular Isogenies over F p2 with Cryptographic Applications
|
2022 |
Pedersen, Robi |
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability
|
2022 |
Joshi, Snehil |
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods
|
2022 |
Yamamura, Kazuki |
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems
|
2022 |
Wei, Congming |
Improved See-In-The-Middle Attacks on AES
|
2022 |
Park, Jonghyun |
Grover on SM3
|
2022 |
Song, Gyeongju |
Revocable Hierarchical Identity-Based Authenticated Key Exchange
|
2022 |
Okano, Yuki |
Improved Lattice-Based Mix-Nets for Electronic Voting
|
2022 |
Farzaliyev, Valeh |
Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice
|
2022 |
Ren, Peixin |
Compiler-based Attack Origin Tracking with Dynamic Taint Analysis
|
2022 |
Braunsdorf, Oliver |
A Preimage Attack on Reduced GIMLI- HASH
|
2022 |
Lee, Yongseong |