[Resource Topic] 2023/361: Authenticated Encryption for Very Short Inputs
|
|
0
|
11
|
March 16, 2023
|
[Resource Topic] 2023/342: TurboSHAKE
|
|
0
|
17
|
March 8, 2023
|
[Resource Topic] 2023/339: An Analysis of the Post Quantum and Classical Security of 4x4 and 16x4 S-Boxes and Their Implementations in Simplified-AES
|
|
0
|
17
|
March 8, 2023
|
[Resource Topic] 2023/328: The state diagram of $\chi$
|
|
0
|
19
|
March 6, 2023
|
[Resource Topic] 2023/316: New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers
|
|
0
|
16
|
March 3, 2023
|
[Resource Topic] 2023/288: Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation
|
|
0
|
19
|
February 27, 2023
|
[Resource Topic] 2023/286: DORCIS: Depth Optimized Quantum Implementation of Substitution Boxes
|
|
0
|
18
|
February 27, 2023
|
[Resource Topic] 2023/262: Generic Attack on Duplex-Based AEAD Modes using Random Function Statistics
|
|
0
|
16
|
February 23, 2023
|
[Resource Topic] 2023/253: XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version)
|
|
0
|
18
|
February 22, 2023
|
[Resource Topic] 2023/241: Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher
|
|
0
|
16
|
February 21, 2023
|
[Resource Topic] 2023/240: Pitfalls and Shortcomings for Decompositions and Alignment (Full Version)
|
|
0
|
15
|
February 21, 2023
|
[Resource Topic] 2023/235: New Results on Machine Learning Based Distinguishers
|
|
0
|
13
|
February 21, 2023
|
[Resource Topic] 2023/226: Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls
|
|
0
|
15
|
February 21, 2023
|
[Resource Topic] 2023/217: Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks
|
|
0
|
13
|
February 20, 2023
|
[Resource Topic] 2023/207: On Quantum Secure Compressing Pseudorandom Functions
|
|
0
|
15
|
February 20, 2023
|
[Resource Topic] 2023/201: DenseQMC: an efficient bit-slice implementation of the Quine-McCluskey algorithm
|
|
0
|
12
|
February 20, 2023
|
[Resource Topic] 2023/197: Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks
|
|
0
|
23
|
February 15, 2023
|
[Resource Topic] 2023/165: Optimizing the depth of quantum implementations of linear layers
|
|
0
|
12
|
February 15, 2023
|
[Resource Topic] 2023/107: The Tip5 Hash Function for Recursive STARKs
|
|
0
|
24
|
January 28, 2023
|
[Resource Topic] 2023/085: The Security of ChaCha20-Poly1305 in the Multi-user Setting
|
|
0
|
19
|
January 26, 2023
|
[Resource Topic] 2023/023: New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks
|
|
0
|
25
|
January 9, 2023
|
[Resource Topic] 2022/1776: Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches
|
|
0
|
28
|
December 31, 2022
|
[Resource Topic] 2022/1761: A Family of Block Ciphers Based on Multiple Quasigroups
|
|
0
|
20
|
December 27, 2022
|
[Resource Topic] 2022/1714: Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing
|
|
0
|
34
|
December 13, 2022
|
[Resource Topic] 2022/1711: Encrypted Nonce Modes on Farfalle
|
|
0
|
31
|
December 10, 2022
|
[Resource Topic] 2022/1702: SCB Mode: Semantically Secure Length-Preserving Encryption
|
|
0
|
28
|
December 10, 2022
|
[Resource Topic] 2022/1694: Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations
|
|
0
|
28
|
December 10, 2022
|
[Resource Topic] 2022/1680: Authenticated Encryption with Key Identification
|
|
0
|
30
|
December 3, 2022
|
[Resource Topic] 2022/1670: Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
|
|
0
|
32
|
December 2, 2022
|
[Resource Topic] 2022/1659: A Deep Learning aided Key Recovery Framework for Large-State Block Ciphers
|
|
0
|
22
|
November 30, 2022
|