Cryptologists Should Not Ignore the History of Al-Andalusia
|
2023 |
Desmedt, Yvo |
QCB is Blindly Unforgeable
|
2023 |
Leuther, Jannis |
Computational Results on Gowers U2 and U3 Norms of Known S-Boxes
|
2023 |
Kumar, Vikas |
Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher
|
2023 |
Nandi, Mridul |
Quantum Cryptanalysis of 5 Rounds Feistel Schemes and Benes Schemes
|
2023 |
Chartouny, Maya |
Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas
|
2023 |
Kelesidis, Evgnosia-Alexandra |
Weightwise Perfectly Balanced Functions and Nonlinearity
|
2023 |
Gini, Agnese |
Compact Post-quantum Signatures from Proofs of Knowledge Leveraging Structure for the PKP, SD and RSD Problems
|
2023 |
Bidoux, Loïc |
On Catalan Constant Continued Fractions
|
2023 |
Naccache, David |
A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts
|
2023 |
Wang, Ruize |
Attack on a Code-Based Signature Scheme from QC-LDPC Codes
|
2023 |
Prabowo, Theo Fanuela |
Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic Environments
|
2023 |
Phung, Ngoc Minh |
A Study for Security of Visual Cryptography
|
2023 |
Thai, Binh Le Thanh |
An Enhanced Anonymous ECC-Based Authentication for Lightweight Application in TMIS
|
2023 |
Idrissi, Hind |
Symmetric 4-Adic Complexity of Quaternary Generalized Cyclotomic Sequences of Order Four with Period 2pⁿ
|
2023 |
Edemskiy, Vladimir |
Full Post-Quantum Datagram TLS Handshake in the Internet of Things
|
2023 |
McLoughlin, Callum |
Moderate Classical McEliece Keys from Quasi-Centrosymmetric Goppa Codes
|
2023 |
Ndiaye, Ousmane |
Multi-input Non-interactive Functional Encryption: Constructions and Applications
|
2023 |
Artem, Grigor |
Lattice-Based Accumulator with Constant Time List Update and Constant Time Verification
|
2023 |
Maeno, Yuta |
Chudnovsky-Type Algorithms over the Projective Line Using Generalized Evaluation Maps
|
2023 |
Ballet, Stéphane |