[Resource Topic] 2024/1559: Mind the Composition of Toffoli Gates: Structural Algebraic Distinguishers of ARADI
|
|
0
|
20
|
October 5, 2024
|
[Resource Topic] 2024/1554: Breaking, Repairing and Enhancing XCBv2 into the Tweakable Enciphering Mode GEM
|
|
0
|
22
|
October 4, 2024
|
[Resource Topic] 2024/1542: Robust AE With Committing Security
|
|
0
|
20
|
October 4, 2024
|
[Resource Topic] 2024/1511: Some Classes of Cubic Monomial Boolean Functions with Good Second-Order Nonlinearity
|
|
0
|
23
|
September 30, 2024
|
[Resource Topic] 2024/1508: Key Collisions on AES and Its Applications
|
|
0
|
25
|
September 30, 2024
|
[Resource Topic] 2024/1484: Quadratic-like balanced functions and permutations
|
|
0
|
32
|
September 24, 2024
|
[Resource Topic] 2024/1483: Making Searchable Symmetric Encryption Schemes Smaller and Faster
|
|
0
|
35
|
September 24, 2024
|
[Resource Topic] 2024/1478: Mind the Bad Norms: Revisiting Compressed Oracle-based Quantum Indistinguishability Proofs
|
|
0
|
31
|
September 21, 2024
|
[Resource Topic] 2024/1474: Mystrium: Wide Block Encryption Efficient on Entry-Level Processors
|
|
0
|
37
|
September 21, 2024
|
[Resource Topic] 2024/1465: Linear approximations of the Flystel construction
|
|
0
|
35
|
September 21, 2024
|
[Resource Topic] 2024/1458: Providing Integrity for Authenticated Encryption in the Presence of Joint Faults and Leakage
|
|
0
|
27
|
September 21, 2024
|
[Resource Topic] 2024/1447: Generic Differential Key Recovery Attacks and Beyond
|
|
0
|
33
|
September 18, 2024
|
[Resource Topic] 2024/1421: Provable Security of Linux-DRBG in the Seedless Robustness Model
|
|
0
|
72
|
September 11, 2024
|
[Resource Topic] 2024/1408: Multiple-Tweak Differential Attack Against SCARF
|
|
0
|
41
|
September 11, 2024
|
[Resource Topic] 2024/1382: Universal Context Commitment without Ciphertext Expansion
|
|
0
|
52
|
September 4, 2024
|
[Resource Topic] 2024/1377: Security Strengthening of Threshold Symmetric Schemes
|
|
0
|
44
|
September 4, 2024
|
[Resource Topic] 2024/1356: Leakage-Resilience of Circuit Garbling
|
|
0
|
36
|
August 30, 2024
|
[Resource Topic] 2024/1346: Provably Secure Online Authenticated Encryption and Bidirectional Online Channels
|
|
0
|
39
|
August 30, 2024
|
[Resource Topic] 2024/1339: Comprehensive Robustness Analysis of GCM, CCM, and OCB3
|
|
0
|
39
|
August 30, 2024
|
[Resource Topic] 2024/1336: Fast Low Level Disk Encryption Using FPGAs
|
|
0
|
35
|
August 30, 2024
|
[Resource Topic] 2024/1334: Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map
|
|
0
|
29
|
August 30, 2024
|
[Resource Topic] 2024/1328: A Note on ARADI and LLAMA
|
|
0
|
71
|
August 26, 2024
|
[Resource Topic] 2024/1325: Authenticity in the Presence of Leakage using a Forkcipher
|
|
0
|
53
|
August 26, 2024
|
[Resource Topic] 2024/1316: Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields
|
|
0
|
64
|
August 23, 2024
|
[Resource Topic] 2024/1305: Constructions of Efficiently Implementable Boolean functions Possessing High Nonlinearity and Good Resistance to Algebraic Attacks
|
|
0
|
48
|
August 23, 2024
|
[Resource Topic] 2024/1278: Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys
|
|
0
|
52
|
August 16, 2024
|
[Resource Topic] 2024/1257: Committing Wide Encryption Mode with Minimum Ciphertext Expansion
|
|
0
|
56
|
August 9, 2024
|
[Resource Topic] 2024/1249: Koala: A Low-Latency Pseudorandom Function
|
|
0
|
70
|
August 7, 2024
|
[Resource Topic] 2024/1247: A Note on the Quasigroup Lai-Massey Structures
|
|
0
|
57
|
August 7, 2024
|
[Resource Topic] 2024/1240: ARADI and LLAMA: Low-Latency Cryptography for Memory Encryption
|
|
0
|
86
|
August 7, 2024
|