Linked e-resources
Details
Table of Contents
Quantum LLL with an Application to Mersenne Number Cryptosystems
Cryptanalysis
Breaking randomized mixed-radix scalar multiplication algorithms
Symmetric Cryptography
Optimally Indi erentiable Double-Block-Length Hashing without Post-processing and with Support for Longer Key than Single Block
Side-Channel Analysis
More Practical Single-Trace Attacks on the Number Theoretic Transform
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results & First Construction
Stronger and Faster Side-Channel Protections for CSIDH
Post-Quantum Cryptography
A Reaction Attack against Cryptosystems based on LRPC Codes
Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits
Compact and simple RLWE based key encapsulation mechanism
Signatures and Protocols
Compact and simple RLWE based key encapsulation mechanism
Implementation
Compact and simple RLWE based key encapsulation mechanism.
Cryptanalysis
Breaking randomized mixed-radix scalar multiplication algorithms
Symmetric Cryptography
Optimally Indi erentiable Double-Block-Length Hashing without Post-processing and with Support for Longer Key than Single Block
Side-Channel Analysis
More Practical Single-Trace Attacks on the Number Theoretic Transform
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results & First Construction
Stronger and Faster Side-Channel Protections for CSIDH
Post-Quantum Cryptography
A Reaction Attack against Cryptosystems based on LRPC Codes
Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits
Compact and simple RLWE based key encapsulation mechanism
Signatures and Protocols
Compact and simple RLWE based key encapsulation mechanism
Implementation
Compact and simple RLWE based key encapsulation mechanism.