Linked e-resources
Details
Table of Contents
Cryptographic Protocol in Quantum Computer Age
Security Analysis of Hash Algorithm
Security analysis of Symmetric Key Encryption Algorithm
Fault and Side-Channel Attack; Constructions and Designs
Quantum Circuit
Efficient Implementation
Cryptographic Protocol I Revocable Hierarchical Identity-Based Authenticated Key Exchange
Towards Witness Encryption Without Multilinear Maps
Designated-Verifier Linkable Ring Signatures
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability
Cryptographic Protocol in Quantum Computer Age Delegating Supersingular Isogenies over Fp2 with Cryptographic Applications
Improved Lattice-Based Mix-Nets for Electronic Voting
Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice
Security Analysis Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods
Resilient CFI: Compiler-based Attack Origin Tracking with Dynamic Taint Analysis
Security Analysis of Hash Algorithm Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems
A Preimage Attack on Reduced Gimli-Hash
Security analysis of Symmetric Key Encryption Algorithm Algebraic Attacks on Grain-like Keystream Generators
Improved See-In-The-Middle Attacks on AES
Fault and Side-Channel Attack Differential Fault Attack on Rocca
Differential Fault Attack on Lightweight Block Cipher PIPO
Learning-based Side-Channel Analysis on PIPO
Constructions and Designs Collision-Resistant and Pseudorandom Function Based on Merkle-Damgard Hash Function
Forward Secure Message Franking
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems
Quantum Circuit T-depth reduction method for efficient SHA-256 quantum circuit construction.
Security Analysis of Hash Algorithm
Security analysis of Symmetric Key Encryption Algorithm
Fault and Side-Channel Attack; Constructions and Designs
Quantum Circuit
Efficient Implementation
Cryptographic Protocol I Revocable Hierarchical Identity-Based Authenticated Key Exchange
Towards Witness Encryption Without Multilinear Maps
Designated-Verifier Linkable Ring Signatures
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability
Cryptographic Protocol in Quantum Computer Age Delegating Supersingular Isogenies over Fp2 with Cryptographic Applications
Improved Lattice-Based Mix-Nets for Electronic Voting
Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice
Security Analysis Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods
Resilient CFI: Compiler-based Attack Origin Tracking with Dynamic Taint Analysis
Security Analysis of Hash Algorithm Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems
A Preimage Attack on Reduced Gimli-Hash
Security analysis of Symmetric Key Encryption Algorithm Algebraic Attacks on Grain-like Keystream Generators
Improved See-In-The-Middle Attacks on AES
Fault and Side-Channel Attack Differential Fault Attack on Rocca
Differential Fault Attack on Lightweight Block Cipher PIPO
Learning-based Side-Channel Analysis on PIPO
Constructions and Designs Collision-Resistant and Pseudorandom Function Based on Merkle-Damgard Hash Function
Forward Secure Message Franking
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems
Quantum Circuit T-depth reduction method for efficient SHA-256 quantum circuit construction.