[Resource Topic] 2024/1867: Symmetric Twin Column Parity Mixers and their Applications
|
|
0
|
28
|
November 15, 2024
|
[Resource Topic] 2024/1864: Tweakable ForkCipher from Ideal Block Cipher
|
|
0
|
28
|
November 15, 2024
|
[Resource Topic] 2024/1836: Symmetric Encryption on a Quantum Computer
|
|
0
|
28
|
November 11, 2024
|
[Resource Topic] 2024/1813: Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD: More Applications of Pseudo-Random Injections
|
|
0
|
24
|
November 8, 2024
|
[Resource Topic] 2024/1795: How Fast Does the Inverse Walk Approximate a Random Permutation?
|
|
0
|
36
|
November 4, 2024
|
[Resource Topic] 2024/1772: Byte-wise equal property of ARADI
|
|
0
|
35
|
November 1, 2024
|
[Resource Topic] 2024/1755: Exponential sums in linear cryptanalysis
|
|
0
|
35
|
October 30, 2024
|
[Resource Topic] 2024/1723: Proving the Security of the Extended Summation-Truncation Hybrid
|
|
0
|
30
|
October 25, 2024
|
[Resource Topic] 2024/1693: A notion on S-boxes for a partial resistance to some integral attacks
|
|
0
|
43
|
October 18, 2024
|
[Resource Topic] 2024/1678: Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis
|
|
0
|
29
|
October 18, 2024
|
[Resource Topic] 2024/1635: RPO-M31 and XHash-M31: Efficient Hash Functions for Circle STARKs
|
|
0
|
42
|
October 14, 2024
|
[Resource Topic] 2024/1634: On Constructing Pseudorandom Involutions: Feistel variants using a single round function
|
|
0
|
33
|
October 14, 2024
|
[Resource Topic] 2024/1624: Double-Matrix: Complete Diffusion in a Single Round with (small) MDS Matrices
|
|
0
|
39
|
October 11, 2024
|
[Resource Topic] 2024/1618: Shaking up authenticated encryption
|
|
0
|
40
|
October 11, 2024
|
[Resource Topic] 2024/1559: Mind the Composition of Toffoli Gates: Structural Algebraic Distinguishers of ARADI
|
|
0
|
41
|
October 5, 2024
|
[Resource Topic] 2024/1554: Breaking, Repairing and Enhancing XCBv2 into the Tweakable Enciphering Mode GEM
|
|
0
|
47
|
October 4, 2024
|
[Resource Topic] 2024/1542: Robust AE With Committing Security
|
|
0
|
36
|
October 4, 2024
|
[Resource Topic] 2024/1511: Some Classes of Cubic Monomial Boolean Functions with Good Second-Order Nonlinearity
|
|
0
|
42
|
September 30, 2024
|
[Resource Topic] 2024/1508: Key Collisions on AES and Its Applications
|
|
0
|
44
|
September 30, 2024
|
[Resource Topic] 2024/1484: Quadratic-like balanced functions and permutations
|
|
0
|
50
|
September 24, 2024
|
[Resource Topic] 2024/1483: Making Searchable Symmetric Encryption Schemes Smaller and Faster
|
|
0
|
54
|
September 24, 2024
|
[Resource Topic] 2024/1478: Mind the Bad Norms: Revisiting Compressed Oracle-based Quantum Indistinguishability Proofs
|
|
0
|
50
|
September 21, 2024
|
[Resource Topic] 2024/1474: Mystrium: Wide Block Encryption Efficient on Entry-Level Processors
|
|
0
|
55
|
September 21, 2024
|
[Resource Topic] 2024/1465: Linear approximations of the Flystel construction
|
|
0
|
56
|
September 21, 2024
|
[Resource Topic] 2024/1458: Providing Integrity for Authenticated Encryption in the Presence of Joint Faults and Leakage
|
|
0
|
45
|
September 21, 2024
|
[Resource Topic] 2024/1447: Generic Differential Key Recovery Attacks and Beyond
|
|
0
|
50
|
September 18, 2024
|
[Resource Topic] 2024/1421: Provable Security of Linux-DRBG in the Seedless Robustness Model
|
|
0
|
94
|
September 11, 2024
|
[Resource Topic] 2024/1408: Multiple-Tweak Differential Attack Against SCARF
|
|
0
|
61
|
September 11, 2024
|
[Resource Topic] 2024/1382: Universal Context Commitment without Ciphertext Expansion
|
|
0
|
67
|
September 4, 2024
|
[Resource Topic] 2024/1377: Security Strengthening of Threshold Symmetric Schemes
|
|
0
|
59
|
September 4, 2024
|