Analysis of the Security of the PSSI Problem and Cryptanalysis of the Durandal Signature Scheme
|
2023 |
Aragon, Nicolas |
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem
|
2023 |
Beullens, Ward |
Practical-Time Related-Key Attack on GOST with Secret S-Boxes
|
2023 |
Dunkelman, Orr |
On Perfect Linear Approximations and Differentials over Two-Round SPNs
|
2023 |
Beierle, Christof |
On the Security of Keyed Hashing Based on Public Permutations
|
2023 |
Fuchs, Jonathan |
When Messages Are Keys: Is HMAC a Dual-PRF?
|
2023 |
Backendal, Matilda |
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
|
2023 |
Grassi, Lorenzo |
Does the Dual-Sieve Attack on Learning with Errors Even Work?
|
2023 |
Ducas, Léo |
Differential Meet-In-The-Middle Cryptanalysis
|
2023 |
Boura, Christina |
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato
|
2023 |
Grassi, Lorenzo |
Moving a Step of ChaCha in Syncopated Rhythm
|
2023 |
Wang, Shichang |
Twin Column Parity Mixers and Gaston: A New Mixing Layer and Permutation
|
2023 |
Hirch, Solane El |
Unifying Freedom and Separation for Tight Probing-Secure Composition
|
2023 |
Belaïd, Sonia |
Fast Practical Lattice Reduction Through Iterated Compression
|
2023 |
Ryan, Keegan |
Learning with Physical Rounding for Linear and Quadratic Leakage Functions
|
2023 |
Hoffmann, Clément |
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: Anemoi Permutations and Jive Compression Mode
|
2023 |
Bouvier, Clémence |
Coefficient Grouping for Complex Affine Layers
|
2023 |
Liu, Fukang |
Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers
|
2023 |
Liu, Tianren |
CSI-Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist
|
2023 |
Katsumata, Shuichi |
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks
|
2023 |
Wang, Tianrui |