Linked e-resources

Details

Best Paper Awards: On the Hardness of the NTRU Problem
A Geometric Approach to Linear Cryptanalysis
Lattice Enumeration for Tower NFS: A 521-Bit Discrete Logarithm Computation; Public-Key Cryptanalysis: Partial Key Exposure Attack on Short Secret Exponent CRT-RSA
A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks
Cryptanalysis of an Oblivious PRF from Supersingular Isogenies; Symmetric-Key Cryptanalysis: A Practical Key-Recovery Attack on 805-Round Trivium
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials
Clustering Effect in Simon and Simeck
New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair
Convexity of Division Property Transitions: Theory, Algorithms and Compact Models
Strong and Tight Security Guarantees Against Integral Distinguishers
Massive Superpoly Recovery with Nested Monomial Predictions
Quantum Linearization Attacks
Generic Framework for Key-Guessing Improvements
On the Non-tightness of Measurement-Based Reductions for Key Encapsulation Mechanism in the Quantum Random Oracle Model
Redeeming Reset Indifferentiability and Applications to Post-quantum Security
Franchised Quantum Money
Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication
Tight Adaptive Reprogramming in the QROM
QCB: Efficient Quantum-Secure Authenticated Encryption.

Browse Subjects

Show more subjects...

Statistics

from
to
Export