Linked e-resources

Details

Public-key Cryptography
Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM
Obfuscating Finite Automata
On Index Calculus Algorithms for Subfield Curves
Symmetric-Key Analysis Weak-Key Distinguishers for AES
Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
Improved (Related-key) Differential Cryptanalysis on GIFT
Boolean Polynomials, BDDs and CRHS Equations
Connecting the Dots with CryptaPath
Boolean Ring Cryptographic Equation Solving
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
Unintended Features of APIs: Cryptanalysis of Incremental HMAC
Quantum Cryptanalysis
Low-gate Quantum Golden Collision Finding
Improvements to quantum search techniques for block-ciphers, with applications to AES
Post-Quantum Constructions
Not enough LESS: An improved algorithm for solving Code Equivalence Problems over Fq
Towards Post-Quantum Security for Signals X3DH Handshake
Trapdoor DDH groups from pairings and isogenies
Practical Isogeny-Based Key-exchange with Optimal Tightness
Symmetric-Key Design
PRINCEv2
Nonce-Misuse Security of the SAEF Authenticated Encryption mode
WARP : Revisiting GFN for Lightweight 128-bit Block Cipher
Side Channel Attacks
Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations
Correlation Power Analysis and Higher-order Masking Implementation of WAGE
On the Influence of Optimizers in Deep Learning-based Side-channel Analysis
Cryptographic Applications
On Self-Equivalence Encodings in White-Box Implementations
Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions.-

Browse Subjects

Show more subjects...

Statistics

from
to
Export