Linked e-resources
Details
Table of Contents
System and Hardware Security/
Power analysis pushed too far: breaking Android-based isolation with fuel gauges
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis
Reliability of Ring Oscillator PUFs with Reduced Helper Data
Symmetric Key Cryptography
Improved Boomerang Attacks on Deoxys-BC
PMACrx: a vector-input MAC for high-dimensional vectors with BBB security
Public Key Cryptography 1
A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors
Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials
Public Key Cryptography 2
Extractable Witness Encryption for the Homogeneous Linear Equation problem
Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger
Zero Knowledge Proofs
aPlonK: Aggregated PlonK from Multi-Polynomial Commitment Schemes
TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup
Card Based Cryptography
Efficient Card-Based Millionaires? Protocols via Non-Binary Input Encoding
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.
Power analysis pushed too far: breaking Android-based isolation with fuel gauges
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis
Reliability of Ring Oscillator PUFs with Reduced Helper Data
Symmetric Key Cryptography
Improved Boomerang Attacks on Deoxys-BC
PMACrx: a vector-input MAC for high-dimensional vectors with BBB security
Public Key Cryptography 1
A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors
Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials
Public Key Cryptography 2
Extractable Witness Encryption for the Homogeneous Linear Equation problem
Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger
Zero Knowledge Proofs
aPlonK: Aggregated PlonK from Multi-Polynomial Commitment Schemes
TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup
Card Based Cryptography
Efficient Card-Based Millionaires? Protocols via Non-Binary Input Encoding
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.