[Resource Topic] 2024/1197: Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
|
|
0
|
14
|
July 25, 2024
|
[Resource Topic] 2024/1186: MATTER: A Wide-Block Tweakable Block Cipher
|
|
0
|
16
|
July 25, 2024
|
[Resource Topic] 2024/1163: On the Number of Restricted Solutions to Constrained Systems and their Applications
|
|
0
|
36
|
July 19, 2024
|
[Resource Topic] 2024/1145: A Practical and Scalable Implementation of the Vernam Cipher, under Shannon Conditions, using Quantum Noise
|
|
0
|
39
|
July 15, 2024
|
[Resource Topic] 2024/1095: Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash
|
|
0
|
16
|
July 15, 2024
|
[Resource Topic] 2024/975: ZLR: a fast online authenticated encryption scheme achieving full security
|
|
0
|
91
|
June 18, 2024
|
[Resource Topic] 2024/951: Notes on (failed) attempts to instantiate TLR3
|
|
0
|
86
|
June 14, 2024
|
[Resource Topic] 2024/929: Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis
|
|
0
|
44
|
June 12, 2024
|
[Resource Topic] 2024/928: The Committing Security of MACs with Applications to Generic Composition
|
|
0
|
42
|
June 12, 2024
|
[Resource Topic] 2024/911: Generalized Indifferentiable Sponge and its Application to Polygon Miden VM
|
|
0
|
50
|
June 8, 2024
|
[Resource Topic] 2024/908: Preliminary Analysis of Ascon-Xof and Ascon-Hash
|
|
0
|
55
|
June 8, 2024
|
[Resource Topic] 2024/901: Practical Committing Attacks against Rocca-S
|
|
0
|
64
|
June 6, 2024
|
[Resource Topic] 2024/894: Quantum Algorithms for Fast Correlation Attacks on LFSR-Based Stream Ciphers
|
|
0
|
52
|
June 5, 2024
|
[Resource Topic] 2024/875: Succinctly-Committing Authenticated Encryption
|
|
0
|
34
|
June 5, 2024
|
[Resource Topic] 2024/871: New Approaches for Estimating the Bias of Differential-Linear Distinguishers (Full Version)
|
|
0
|
42
|
June 5, 2024
|
[Resource Topic] 2024/858: Ascon-Keccak AEAD Algorithm
|
|
0
|
60
|
May 31, 2024
|
[Resource Topic] 2024/841: Two generalizations of almost perfect nonlinearity
|
|
0
|
44
|
May 31, 2024
|
[Resource Topic] 2024/819: A new stand-alone MAC construct called SMAC
|
|
0
|
79
|
May 27, 2024
|
[Resource Topic] 2024/802: On Maximum Size Simultaneous Linear Approximations in Ascon and Keccak and Related Translation and Differential Properties
|
|
0
|
82
|
May 24, 2024
|
[Resource Topic] 2024/791: Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
|
|
0
|
53
|
May 24, 2024
|
[Resource Topic] 2024/763: On SIS-problem-based random Feistel ciphers and its statistical evaluation of resistance against differential cryptanalysis
|
|
0
|
49
|
May 20, 2024
|
[Resource Topic] 2024/754: Adversary Resilient Learned Bloom Filters
|
|
0
|
41
|
May 20, 2024
|
[Resource Topic] 2024/745: $\mathsf{FRAST}$: TFHE-friendly Cipher Based on Random S-boxes
|
|
0
|
67
|
May 16, 2024
|
[Resource Topic] 2024/743: Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings -- with a Break-Fix Strategy
|
|
0
|
77
|
May 16, 2024
|
[Resource Topic] 2024/731: Tight Security of Double-Block Nonce-Based MACs
|
|
0
|
70
|
May 16, 2024
|
[Resource Topic] 2024/725: Multi User Security of LightMAC and LightMAC_Plus
|
|
0
|
64
|
May 13, 2024
|
[Resource Topic] 2024/722: Ultrametric integral cryptanalysis
|
|
0
|
63
|
May 11, 2024
|
[Resource Topic] 2024/695: Beale Cipher 1 and Cipher 3: Numbers With No Messages
|
|
0
|
66
|
May 10, 2024
|
[Resource Topic] 2024/658: Information-theoretic security with asymmetries
|
|
0
|
79
|
April 29, 2024
|
[Resource Topic] 2024/647: Weightwise (almost) perfectly balanced functions based on total orders
|
|
0
|
63
|
April 29, 2024
|