Linked e-resources

Details

Block Ciphers
Best Paper: How Fast Can SM4 Be in Software?
LLLWBC: A New Low-Latency Light-Weight Block Cipher
New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits
Public key Encryption & Signature
You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature
SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications
McEliece-type encryption based on Gabidulin codes with no hidden structure
Quantum
Optimizing the depth of quantum implementations of linear layers
IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited
MPC
Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion
Amortizing Division and Exponentiation
Cryptanalysis
Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT
Cryptanalysis of Ciminion
Clustering Effect of Iterative Differential and Linear Trails
Differential Cryptanalysis of Round-reduced SPEEDY Family
Mathematical aspects of Crypto
A note on inverted twisted Edwards curve
Efficiently Computable Complex Multiplication of Elliptic Curves
Several classes of Niho type Boolean functions with few Walsh transform values
Stream ciphers
Higher-Order Masking Scheme for Trivium Hardware Implementation
An Experimentally Verified Attack on 820-Round Trivium
Malware
HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification
Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns
Efficient DNN Backdoor Detection Guided by Static Weight Analysis
Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans
Lattices
Subfield Attacks on HSVP in Ideal Lattices
On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices
Inferring Sequences Produced by the Quadratic Generator.

Browse Subjects

Show more subjects...

Statistics

from
to
Export