[Resource Topic] 2024/763: On SIS-problem-based random Feistel ciphers and its statistical evaluation of resistance against differential cryptanalysis
|
|
0
|
9
|
May 20, 2024
|
[Resource Topic] 2024/754: Adversary Resilient Learned Bloom Filters
|
|
0
|
10
|
May 20, 2024
|
[Resource Topic] 2024/745: $\mathsf{FRAST}$: TFHE-friendly Cipher Based on Random S-boxes
|
|
0
|
25
|
May 16, 2024
|
[Resource Topic] 2024/743: Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings -- with a Break-Fix Strategy
|
|
0
|
21
|
May 16, 2024
|
[Resource Topic] 2024/731: Tight Security of Double-Block Nonce-Based MACs
|
|
0
|
17
|
May 16, 2024
|
[Resource Topic] 2024/725: Multi User Security of LightMAC and LightMAC_Plus
|
|
0
|
24
|
May 13, 2024
|
[Resource Topic] 2024/722: Ultrametric integral cryptanalysis
|
|
0
|
31
|
May 11, 2024
|
[Resource Topic] 2024/695: Beale Cipher 1 and Cipher 3: Numbers With No Messages
|
|
0
|
30
|
May 10, 2024
|
[Resource Topic] 2024/658: Information-theoretic security with asymmetries
|
|
0
|
39
|
April 29, 2024
|
[Resource Topic] 2024/647: Weightwise (almost) perfectly balanced functions based on total orders
|
|
0
|
29
|
April 29, 2024
|
[Resource Topic] 2024/605: Security Analysis of XHASH8/12
|
|
0
|
39
|
April 22, 2024
|
[Resource Topic] 2024/600: A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-
|
|
0
|
58
|
April 22, 2024
|
[Resource Topic] 2024/598: A Characterization of AE Robustness as Decryption Leakage Indistinguishability
|
|
0
|
44
|
April 18, 2024
|
[Resource Topic] 2024/579: Tight Multi-user Security of Ascon and Its Large Key Extension
|
|
0
|
37
|
April 16, 2024
|
[Resource Topic] 2024/557: Permutation-Based Hash Chains with Application to Password Hashing
|
|
0
|
44
|
April 10, 2024
|
[Resource Topic] 2024/550: Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV
|
|
0
|
32
|
April 10, 2024
|
[Resource Topic] 2024/520: A note on securing insertion-only Cuckoo filters
|
|
0
|
52
|
April 6, 2024
|
[Resource Topic] 2024/483: Lower data attacks on Advanced Encryption Standard
|
|
0
|
46
|
March 26, 2024
|
[Resource Topic] 2024/431: Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version
|
|
0
|
53
|
March 15, 2024
|
[Resource Topic] 2024/422: A Class of Weightwise Almost Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity
|
|
0
|
54
|
March 15, 2024
|
[Resource Topic] 2024/407: Permutation-Based Hashing Beyond the Birthday Bound
|
|
0
|
47
|
March 8, 2024
|
[Resource Topic] 2024/405: Traceable Secret Sharing: Strong Security and Efficient Constructions
|
|
0
|
46
|
March 8, 2024
|
[Resource Topic] 2024/381: Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure
|
|
0
|
48
|
March 4, 2024
|
[Resource Topic] 2024/351: Improved Differential Meet-In-The-Middle Cryptanalysis
|
|
0
|
40
|
March 1, 2024
|
[Resource Topic] 2024/338: Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis
|
|
0
|
70
|
February 27, 2024
|
[Resource Topic] 2024/315: Alternative Key Schedules for the AES
|
|
0
|
43
|
February 26, 2024
|
[Resource Topic] 2024/294: Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate
|
|
0
|
51
|
February 23, 2024
|
[Resource Topic] 2024/289: SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice
|
|
0
|
50
|
February 23, 2024
|
[Resource Topic] 2024/288: A generic algorithm for efficient key recovery in differential attacks – and its associated tool
|
|
0
|
66
|
February 23, 2024
|
[Resource Topic] 2024/275: The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets
|
|
0
|
47
|
February 19, 2024
|