Algebraic Meet-in-the-Middle Attack on LowMC

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ASIACRYPT (28. : 2022 : Taipei) Advances in cryptology - ASIACRYPT 2022 ; Part 1
1. Verfasser: Liu, Fukang (VerfasserIn)
Weitere Verfasser: Sarkar, Santanu (VerfasserIn), Wang, Gaoli (VerfasserIn), Meier, Willi (VerfasserIn), Isobe, Takanori (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Full Quantum Equivalence of Group Action DLog and CDH, and More 2022 Montgomery, Hart
SwirTEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves: Faster Indifferentiable Hashing to Elliptic Curves 2022 Chavez-Saab, Jorge
Collusion-Resistant Functional Encryption for RAMs 2022 Ananth, Prabhanjan
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH 2022 Datta, Pratish
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forré 2022 Coutinho, Murilo
Enhancing Differential-Neural Cryptanalysis 2022 Bao, Zhenzhen
A Modular Approach to the Security Analysis of Two-Permutation Constructions 2022 Chen, Yu Long
Random Sources in Private Computation 2022 Couteau, Geoffroy
Efficient Adaptively-Secure Byzantine Agreement for Long Messages 2022 Bhangale, Amey
Attaining GOD Beyond Honest Majority with Friends and Foes 2022 Hegde, Aditya
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model 2022 Cascudo, Ignacio
A Universally Composable Non-interactive Aggregate Cash System 2022 Jia, Yanxue
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients 2022 Abusalah, Hamza
Algebraic Meet-in-the-Middle Attack on LowMC 2022 Liu, Fukang
Witness Encryption and Null-IO from Evasive LWE 2022 Vaikuntanathan, Vinod
Towards Tight Security Bounds for OMAC, XCBC and TMAC 2022 Chattopadhyay, Soumya
Practical Provably Secure Flooding for Blockchains 2022 Liu-Zhang, Chen-Da
Multi-Client Functional Encryption with Fine-Grained Access Control 2022 Nguyen, Ky
Non-interactive Secure Computation of Inner-Product from LPN and LWE 2022 Couteau, Geoffroy
Concurrently Composable Non-interactive Secure Computation 2022 Morgan, Andrew
Alle Artikel auflisten