A Small GIFT-COFB: Lightweight Bit-Serial Architectures
|
2022 |
Caforio, Andrea |
Identity-Based Encryption in DDH Hard Groups
|
2022 |
Blazy, Olivier |
Breaking Panther
|
2022 |
Boura, Christina |
Solving the Learning Parity with Noise Problem Using Quantum Algorithms
|
2022 |
Tran, Bénédikt |
DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits
|
2022 |
Sedlacek, Vladimir |
Finding Low-Weight Polynomial Multiples Using the Rho Method
|
2022 |
Aimani, Laila El |
FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix
|
2022 |
Gupta, Kishan Chand |
Dilithium for Memory Constrained Devices
|
2022 |
Bos, Joppe W. |
Lattice-Based Inner Product Argument
|
2022 |
Kuchta, Veronika |
An Estimator for the Hardness of the MQ Problem
|
2022 |
Bellini, Emanuele |
TransNet: Shift Invariant Transformer Network for Side Channel Analysis
|
2022 |
Hajra, Suvadeep |
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks
|
2022 |
Venema, Marloes |
Automated Key Recovery Attacks on Round-Reduced Orthros
|
2022 |
Li, Muzhou |
Streaming SPHINCS+ for Embedded Devices Using the Example of TPMs
|
2022 |
Niederhagen, Ruben |
Recovering Rainbow’s Secret Key with a First-Order Fault Attack
|
2022 |
Aulbach, Thomas |
EHNP Strikes Back: Analyzing SM2 Implementations
|
2022 |
Cao, Jinzheng |
Construction of Recursive MDS Matrices Using DLS Matrices
|
2022 |
Gupta, Kishan Chand |
And Rijndael? Automatic Related-Key Differential Analysis of Rijndael
|
2022 |
Rouquette, Loïc |
Cryptanalysis of Reduced Round SPEEDY
|
2022 |
Rohit, Raghvendra |
To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA
|
2022 |
Rezaeezade, Azade |