Does the Dual-Sieve Attack on Learning with Errors Even Work?
|
2023 |
Ducas, Léo |
Differential Meet-In-The-Middle Cryptanalysis
|
2023 |
Boura, Christina |
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato
|
2023 |
Grassi, Lorenzo |
Moving a Step of ChaCha in Syncopated Rhythm
|
2023 |
Wang, Shichang |
Twin Column Parity Mixers and Gaston: A New Mixing Layer and Permutation
|
2023 |
Hirch, Solane El |
Unifying Freedom and Separation for Tight Probing-Secure Composition
|
2023 |
Belaïd, Sonia |
Fast Practical Lattice Reduction Through Iterated Compression
|
2023 |
Ryan, Keegan |
Learning with Physical Rounding for Linear and Quadratic Leakage Functions
|
2023 |
Hoffmann, Clément |
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: Anemoi Permutations and Jive Compression Mode
|
2023 |
Bouvier, Clémence |
Coefficient Grouping for Complex Affine Layers
|
2023 |
Liu, Fukang |
Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers
|
2023 |
Liu, Tianren |
CSI-Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist
|
2023 |
Katsumata, Shuichi |
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks
|
2023 |
Wang, Tianrui |
Finding Short Integer Solutions When the Modulus Is Small
|
2023 |
Ducas, Léo |
Prouff and Rivain’s Formal Security Proof of Masking, Revisited Tight Bounds in the Noisy Leakage Model
|
2023 |
Masure, Loïc |
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler
|
2023 |
Berndt, Sebastian |
Revisiting the Indifferentiability of the Sum of Permutations
|
2023 |
Gunsing, Aldo |
Weak Instances of Class Group Action Based Cryptography via Self-pairings
|
2023 |
Castryck, Wouter |
Analysis of the Security of the PSSI Problem and Cryptanalysis of the Durandal Signature Scheme
|
2023 |
Aragon, Nicolas |
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem
|
2023 |
Beullens, Ward |