Linked e-resources
Details
Table of Contents
Timing Attacks
Just A Little Bit More
Cache Storage Attacks
Design and Analysis of Block Ciphers
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
Improved Attacks on Reduced-Round Camellia-128/192/256
Attribute and Identity Based Encryption Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts
Membership
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives
Non-Interactive Zero-Knowledge Proofs of Non-Membership
Secure and Efficient Implementation of AES Based Cryptosystems Implementing GCM on ARMv8
Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON
Chosen Ciphertext Attacks in Theory and Practice Completeness of Single-Bit Projection-KDM Security for Public Key Encryption
Format Oracles on OpenPGP
Algorithms for Solving Hard Problems
Finding Shortest Lattice Vectors in the Presence of Gaps
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints
Constructions of Hash Functions and Message Authentication Codes
Hash Functions from Defective Ideal Ciphers
Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication
Secure Multiparty Computation.-Efficient Leakage Resilient Circuit Compilers
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party
Computation
Authenticated Encryption
How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
Cryptanalysis of Ascon
Detecting and Tracing Malicious Activities Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Implementation Attacks on Exponentiation Algorithms
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Cold Boot Attacks in the Discrete Logarithm Setting
Homomorphic Encryption and Its Applications
Communication Optimal Tardos-based Asymmetric Fingerprinting. Linearly Homomorphic Encryption from DDH.
Just A Little Bit More
Cache Storage Attacks
Design and Analysis of Block Ciphers
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
Improved Attacks on Reduced-Round Camellia-128/192/256
Attribute and Identity Based Encryption Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts
Membership
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives
Non-Interactive Zero-Knowledge Proofs of Non-Membership
Secure and Efficient Implementation of AES Based Cryptosystems Implementing GCM on ARMv8
Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON
Chosen Ciphertext Attacks in Theory and Practice Completeness of Single-Bit Projection-KDM Security for Public Key Encryption
Format Oracles on OpenPGP
Algorithms for Solving Hard Problems
Finding Shortest Lattice Vectors in the Presence of Gaps
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints
Constructions of Hash Functions and Message Authentication Codes
Hash Functions from Defective Ideal Ciphers
Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication
Secure Multiparty Computation.-Efficient Leakage Resilient Circuit Compilers
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party
Computation
Authenticated Encryption
How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
Cryptanalysis of Ascon
Detecting and Tracing Malicious Activities Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Implementation Attacks on Exponentiation Algorithms
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Cold Boot Attacks in the Discrete Logarithm Setting
Homomorphic Encryption and Its Applications
Communication Optimal Tardos-based Asymmetric Fingerprinting. Linearly Homomorphic Encryption from DDH.