Linked e-resources
Details
Table of Contents
Symmetric-Key Cryptography
Improved Differential Cryptanalysis on SPECK Using Plaintext Structures
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly Fp-based Ciphers
A New Correlation Cube Attack Based on Division Property
The Triangle Differential Cryptanalysis
Key Recovery Attacks on Grain-like Keystream Generators with Key Injection
Related-Cipher Attacks: Applications to Ballet and ANT
Cryptanalysis of SPEEDY
Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure
Exploring Formal Methods for Cryptographic Hash FunctionImplementations
Public-Key Cryptography
A Tightly Secure ID-Based Signature Scheme under DL Assumption in AGM
Compact Password Authenticated Key Exchange from Group Actions
Multi-key Homomorphic Secret Sharing from LWE without Multi-key HE
Identity-Based Encryption from Lattices Using Approximate Trapdoors
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors
Post-Quantum Cryptography
Quantum-access Security of Hash-based Signature Schemes
Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model
Ghidle: Efficient Large-State Block Ciphers for Post-Quantum Security
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers
Memory-Efficient Quantum Information Set Decoding Algorithm
Cryptographic Protocols
CSI-SharK: CSI-FiSh with Sharing-friendly Keys
Practical Verifiable Random Function with RKA Security
Statistically Consistent Broadcast Authenticated Encryption with Keyword Search Adaptive Security from Standard Assumptions
Modular Design of KEM-Based Authenticated Key Exchange
Reusable, Instant and Private Payment Guarantees for Cryptocurrencies
System Security
BinAlign: Alignment Padding based Compiler Provenance Recovery
Encrypted Network Traffic Classiffication with Higher Order Graph Neural Network.
Improved Differential Cryptanalysis on SPECK Using Plaintext Structures
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly Fp-based Ciphers
A New Correlation Cube Attack Based on Division Property
The Triangle Differential Cryptanalysis
Key Recovery Attacks on Grain-like Keystream Generators with Key Injection
Related-Cipher Attacks: Applications to Ballet and ANT
Cryptanalysis of SPEEDY
Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure
Exploring Formal Methods for Cryptographic Hash FunctionImplementations
Public-Key Cryptography
A Tightly Secure ID-Based Signature Scheme under DL Assumption in AGM
Compact Password Authenticated Key Exchange from Group Actions
Multi-key Homomorphic Secret Sharing from LWE without Multi-key HE
Identity-Based Encryption from Lattices Using Approximate Trapdoors
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors
Post-Quantum Cryptography
Quantum-access Security of Hash-based Signature Schemes
Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model
Ghidle: Efficient Large-State Block Ciphers for Post-Quantum Security
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers
Memory-Efficient Quantum Information Set Decoding Algorithm
Cryptographic Protocols
CSI-SharK: CSI-FiSh with Sharing-friendly Keys
Practical Verifiable Random Function with RKA Security
Statistically Consistent Broadcast Authenticated Encryption with Keyword Search Adaptive Security from Standard Assumptions
Modular Design of KEM-Based Authenticated Key Exchange
Reusable, Instant and Private Payment Guarantees for Cryptocurrencies
System Security
BinAlign: Alignment Padding based Compiler Provenance Recovery
Encrypted Network Traffic Classiffication with Higher Order Graph Neural Network.