[Resource Topic] 2024/605: Security Analysis of XHASH8/12
|
|
0
|
19
|
April 22, 2024
|
[Resource Topic] 2024/600: A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-
|
|
0
|
20
|
April 22, 2024
|
[Resource Topic] 2024/598: A Characterization of AE Robustness as Decryption Leakage Indistinguishability
|
|
0
|
24
|
April 18, 2024
|
[Resource Topic] 2024/579: Tight Multi-user Security of Ascon and Its Large Key Extension
|
|
0
|
24
|
April 16, 2024
|
[Resource Topic] 2024/557: Permutation-Based Hash Chains with Application to Password Hashing
|
|
0
|
29
|
April 10, 2024
|
[Resource Topic] 2024/550: Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV
|
|
0
|
21
|
April 10, 2024
|
[Resource Topic] 2024/520: A note on securing insertion-only Cuckoo filters
|
|
0
|
28
|
April 6, 2024
|
[Resource Topic] 2024/483: Lower data attacks on Advanced Encryption Standard
|
|
0
|
34
|
March 26, 2024
|
[Resource Topic] 2024/431: Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version
|
|
0
|
35
|
March 15, 2024
|
[Resource Topic] 2024/422: A Class of Weightwise Almost Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity
|
|
0
|
38
|
March 15, 2024
|
[Resource Topic] 2024/407: Permutation-Based Hashing Beyond the Birthday Bound
|
|
0
|
37
|
March 8, 2024
|
[Resource Topic] 2024/405: Traceable Secret Sharing: Strong Security and Efficient Constructions
|
|
0
|
31
|
March 8, 2024
|
[Resource Topic] 2024/381: Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure
|
|
0
|
40
|
March 4, 2024
|
[Resource Topic] 2024/351: Improved Differential Meet-In-The-Middle Cryptanalysis
|
|
0
|
30
|
March 1, 2024
|
[Resource Topic] 2024/338: Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis
|
|
0
|
48
|
February 27, 2024
|
[Resource Topic] 2024/315: Alternative Key Schedules for the AES
|
|
0
|
33
|
February 26, 2024
|
[Resource Topic] 2024/294: Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate
|
|
0
|
36
|
February 23, 2024
|
[Resource Topic] 2024/289: SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice
|
|
0
|
38
|
February 23, 2024
|
[Resource Topic] 2024/288: A generic algorithm for efficient key recovery in differential attacks – and its associated tool
|
|
0
|
41
|
February 23, 2024
|
[Resource Topic] 2024/275: The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets
|
|
0
|
36
|
February 19, 2024
|
[Resource Topic] 2024/240: Implementation of Cryptanalytic Programs Using ChatGPT
|
|
0
|
37
|
February 16, 2024
|
[Resource Topic] 2024/218: Lightweight Leakage-Resilient PRNG from TBCs using Superposition
|
|
0
|
28
|
February 16, 2024
|
[Resource Topic] 2024/213: A Note on Adversarial Online Complexity in Security Proofs of Duplex-Based Authenticated Encryption Modes
|
|
0
|
32
|
February 16, 2024
|
[Resource Topic] 2024/190: Constructing Committing and Leakage-Resilient Authenticated Encryption
|
|
0
|
47
|
February 9, 2024
|
[Resource Topic] 2024/180: Exploiting RPMB authentication in a closed source TEE implementation
|
|
0
|
54
|
February 9, 2024
|
[Resource Topic] 2024/163: On Tweakable Correlation Robust Hashing against Key Leakages
|
|
0
|
43
|
February 6, 2024
|
[Resource Topic] 2024/152: Equivalence of Generalised Feistel Networks
|
|
0
|
65
|
February 5, 2024
|
[Resource Topic] 2024/151: Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing
|
|
0
|
45
|
February 2, 2024
|
[Resource Topic] 2024/126: Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK
|
|
0
|
39
|
January 30, 2024
|
[Resource Topic] 2024/113: Improved Linear Key Recovery Attacks on PRESENT
|
|
0
|
40
|
January 26, 2024
|