Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

A Complete Characterization of Plateaued Boolean Functions in Terms of Their Cayley Graphs
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications
Ubiquitous Weak-key Classes of BRW-polynomial Function
Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count
Two Simple Composition Theorems with H-coefficients
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC
SCA-Resistance for AES: How Cheap Can We Go
Cryptanalysis of 1-Round KECCAK
Performing Computations on Hierarchically Shared Secrets
Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge
Unified Formulas for Some Deterministic Almost-injective Encodings into Hyperelliptic Curves
HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction
Large FHE Gates from Tensored Homomorphic Accumulator
Two-Face: New Public Key Multivariate Schemes
Cryptanalysis of RSA Variants with Modidied Euler Quotient
Saber: Module-LWR Based Key Exchange, CPA-secure Encryption and CCA-secure KEM
Practical Fault Injection on Deterministic Signatures: The Case of EdDSA
Authentication with Weaker Trust Assumptions for Voting Systems
Shorter Double-authentication Preventing Signatures for Small Address Spaces.

Browse Subjects

Show more subjects...

Statistics

from
to
Export