TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks
|
2022 |
Venema, Marloes |
Automated Key Recovery Attacks on Round-Reduced Orthros
|
2022 |
Li, Muzhou |
Streaming SPHINCS+ for Embedded Devices Using the Example of TPMs
|
2022 |
Niederhagen, Ruben |
Recovering Rainbow’s Secret Key with a First-Order Fault Attack
|
2022 |
Aulbach, Thomas |
EHNP Strikes Back: Analyzing SM2 Implementations
|
2022 |
Cao, Jinzheng |
Construction of Recursive MDS Matrices Using DLS Matrices
|
2022 |
Gupta, Kishan Chand |
And Rijndael? Automatic Related-Key Differential Analysis of Rijndael
|
2022 |
Rouquette, Loïc |
Cryptanalysis of Reduced Round SPEEDY
|
2022 |
Rohit, Raghvendra |
To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA
|
2022 |
Rezaeezade, Azade |
Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards
|
2022 |
Haga, Rikuo |
A Random Oracle for All of Us
|
2022 |
Fischlin, Marc |
A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption
|
2022 |
Arenas, Mónica P. |
A Generalized Attack on the Multi-prime Power RSA
|
2022 |
Nitaj, Abderrahmane |
Co-factor Clearing and Subgroup Membership Testing on Pairing-Friendly Curves
|
2022 |
Housni, Youssef El |
A Small GIFT-COFB: Lightweight Bit-Serial Architectures
|
2022 |
Caforio, Andrea |
Identity-Based Encryption in DDH Hard Groups
|
2022 |
Blazy, Olivier |
Breaking Panther
|
2022 |
Boura, Christina |
Solving the Learning Parity with Noise Problem Using Quantum Algorithms
|
2022 |
Tran, Bénédikt |
DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits
|
2022 |
Sedlacek, Vladimir |
Finding Low-Weight Polynomial Multiples Using the Rho Method
|
2022 |
Aimani, Laila El |