Fast Practical Lattice Reduction Through Iterated Compression
|
2023 |
Ryan, Keegan |
Learning with Physical Rounding for Linear and Quadratic Leakage Functions
|
2023 |
Hoffmann, Clément |
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: Anemoi Permutations and Jive Compression Mode
|
2023 |
Bouvier, Clémence |
Coefficient Grouping for Complex Affine Layers
|
2023 |
Liu, Fukang |
Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers
|
2023 |
Liu, Tianren |
CSI-Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist
|
2023 |
Katsumata, Shuichi |
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks
|
2023 |
Wang, Tianrui |
Finding Short Integer Solutions When the Modulus Is Small
|
2023 |
Ducas, Léo |
Prouff and Rivain’s Formal Security Proof of Masking, Revisited Tight Bounds in the Noisy Leakage Model
|
2023 |
Masure, Loïc |
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler
|
2023 |
Berndt, Sebastian |
Revisiting the Indifferentiability of the Sum of Permutations
|
2023 |
Gunsing, Aldo |
Weak Instances of Class Group Action Based Cryptography via Self-pairings
|
2023 |
Castryck, Wouter |
Analysis of the Security of the PSSI Problem and Cryptanalysis of the Durandal Signature Scheme
|
2023 |
Aragon, Nicolas |
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem
|
2023 |
Beullens, Ward |
Practical-Time Related-Key Attack on GOST with Secret S-Boxes
|
2023 |
Dunkelman, Orr |
On Perfect Linear Approximations and Differentials over Two-Round SPNs
|
2023 |
Beierle, Christof |
On the Security of Keyed Hashing Based on Public Permutations
|
2023 |
Fuchs, Jonathan |
When Messages Are Keys: Is HMAC a Dual-PRF?
|
2023 |
Backendal, Matilda |
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
|
2023 |
Grassi, Lorenzo |
Does the Dual-Sieve Attack on Learning with Errors Even Work?
|
2023 |
Ducas, Léo |