Linked e-resources
Details
Table of Contents
Revised version of block cipher CHAM / Dongyoung Roh, Bonwook Koo, Younghoon Jung, Il Woong Jeong, Dong-Geon Lee, Daesung Kwon, and Woo-Hwan Kim
Systematic construction of nonlinear product attacks on block ciphers / Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, and Marek Grajek
Authenticated encryption based on Lesamnta-LW hashing mode / Shoichi Hirose, Hidenori Kuwakado, and Hirotaka Yoshida
All the HIGHT you need on Cortex-M4 / Hwajeong Seo and Zhe Liu
Fast AES implementation using ARMv8 ASIMD without cryptography extension / Hayato Fujii, Félix Carvalho Rodrigues, and Julio López
FACE-LIGHT : fast AES-CTR mode encryption for low-end microcontrollers / Kyungho Kim, Seungju Choi, Hyeokdong Kwon, Zhe Liu, and Hwajeong Seo
Sum it up : verifiable additive homomorphic secret sharing / Georgia Tsaloli and Aikaterini Mitrokotsa
There is always an exception : controlling partial information leakage in secure computation / Máté Horváth, Levente Buttyán, Gábor Székely, and Dóra Neubrandt
An automated security analysis framework and implementation for MTD techniques on cloud / Hooman Alavizadeh, Hootan Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, and Masood Niazi Torshiz
Security analysis of group action inverse problem with auxiliary inputs with application to CSIDH parameters / Taechan Kim
Secure key encapsulation mechanism with compact ciphertext and public key from generalized Srivastava code / Jayashree Dey and Ratna Dutta
Improvement of binary and non-binary statistical decoding algorithm / Pierre-Louis Cayrel, Cheikh Thiécoumba Gueye, Junaid Ahmad Khan, Jean Belo Klamti, and Edoardo Persichetti
LizarMong : excellent key encapsulation mechanism based on RLWE and RLWR / Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, and Yunheung Paek
Efficient identity-based encryption from LWR / Jung Hee Cheon, Haejin Cho, Jaewook Jung, Joohee Lee, and Keewoo Lee
Faster bootstrapping of FHE over the integers / Jung Hee Cheon, Kyoohyung Han, and Duhyeong Kim
Complete addition law for Montgomery curves / Jaeheon Kim, Je Hong Park, Dong-Chan Kim, and Woo-Hwan Kim
Improved CRT-RSA secret key recovery method from sliding window leakage / Kento Oonishi, Xiaoxuan Huang, and Noboru Kunihiro
Differential random fault attacks on certain CAESAR stream ciphers / Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, and Ed Dawson.
Systematic construction of nonlinear product attacks on block ciphers / Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, and Marek Grajek
Authenticated encryption based on Lesamnta-LW hashing mode / Shoichi Hirose, Hidenori Kuwakado, and Hirotaka Yoshida
All the HIGHT you need on Cortex-M4 / Hwajeong Seo and Zhe Liu
Fast AES implementation using ARMv8 ASIMD without cryptography extension / Hayato Fujii, Félix Carvalho Rodrigues, and Julio López
FACE-LIGHT : fast AES-CTR mode encryption for low-end microcontrollers / Kyungho Kim, Seungju Choi, Hyeokdong Kwon, Zhe Liu, and Hwajeong Seo
Sum it up : verifiable additive homomorphic secret sharing / Georgia Tsaloli and Aikaterini Mitrokotsa
There is always an exception : controlling partial information leakage in secure computation / Máté Horváth, Levente Buttyán, Gábor Székely, and Dóra Neubrandt
An automated security analysis framework and implementation for MTD techniques on cloud / Hooman Alavizadeh, Hootan Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, and Masood Niazi Torshiz
Security analysis of group action inverse problem with auxiliary inputs with application to CSIDH parameters / Taechan Kim
Secure key encapsulation mechanism with compact ciphertext and public key from generalized Srivastava code / Jayashree Dey and Ratna Dutta
Improvement of binary and non-binary statistical decoding algorithm / Pierre-Louis Cayrel, Cheikh Thiécoumba Gueye, Junaid Ahmad Khan, Jean Belo Klamti, and Edoardo Persichetti
LizarMong : excellent key encapsulation mechanism based on RLWE and RLWR / Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, and Yunheung Paek
Efficient identity-based encryption from LWR / Jung Hee Cheon, Haejin Cho, Jaewook Jung, Joohee Lee, and Keewoo Lee
Faster bootstrapping of FHE over the integers / Jung Hee Cheon, Kyoohyung Han, and Duhyeong Kim
Complete addition law for Montgomery curves / Jaeheon Kim, Je Hong Park, Dong-Chan Kim, and Woo-Hwan Kim
Improved CRT-RSA secret key recovery method from sliding window leakage / Kento Oonishi, Xiaoxuan Huang, and Noboru Kunihiro
Differential random fault attacks on certain CAESAR stream ciphers / Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, and Ed Dawson.