[Resource Topic] 2023/1673: Designing Full-Rate Sponge based AEAD modes
|
|
0
|
76
|
November 2, 2023
|
[Resource Topic] 2023/1668: Arithmetization Oriented Encryption
|
|
0
|
66
|
November 2, 2023
|
[Resource Topic] 2023/1658: On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweaks
|
|
0
|
60
|
November 2, 2023
|
[Resource Topic] 2023/1653: QCB is Blindly Unforgeable
|
|
0
|
77
|
November 2, 2023
|
[Resource Topic] 2023/1558: StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations
|
|
0
|
87
|
October 11, 2023
|
[Resource Topic] 2023/1525: Committing Authenticated Encryption: Sponges vs. Block-Ciphers in the case of the NIST LWC Finalists
|
|
0
|
113
|
October 9, 2023
|
[Resource Topic] 2023/1520: Kirby: A Robust Permutation-Based PRF Construction
|
|
0
|
78
|
October 6, 2023
|
[Resource Topic] 2023/1494: Committing authenticated encryption based on SHAKE
|
|
0
|
91
|
October 2, 2023
|
[Resource Topic] 2023/1474: Mitigation on the AIM Cryptanalysis
|
|
0
|
87
|
September 27, 2023
|
[Resource Topic] 2023/1449: Truncated Differential Attacks: New Insights and 10-round Attacks on QARMA
|
|
0
|
111
|
September 24, 2023
|
[Resource Topic] 2023/1432: Populating the Zoo of Rugged Pseudorandom Permutations
|
|
0
|
84
|
September 24, 2023
|
[Resource Topic] 2023/1431: Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs
|
|
0
|
73
|
September 24, 2023
|
[Resource Topic] 2023/1422: Tight Security Bound of 2k-LightMAC Plus
|
|
0
|
78
|
September 24, 2023
|
[Resource Topic] 2023/1379: GLEVIAN and VIGORNIAN: Robust beyond-birthday AEAD modes
|
|
0
|
71
|
September 22, 2023
|
[Resource Topic] 2023/1361: Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation
|
|
0
|
96
|
September 13, 2023
|
[Resource Topic] 2023/1357: Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication
|
|
0
|
93
|
September 13, 2023
|
[Resource Topic] 2023/1355: Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations
|
|
0
|
102
|
September 13, 2023
|
[Resource Topic] 2023/1353: Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis
|
|
0
|
88
|
September 11, 2023
|
[Resource Topic] 2023/1305: About “$k$-bit security” of MACs based on hash function Streebog
|
|
0
|
81
|
September 2, 2023
|
[Resource Topic] 2023/1302: Revisiting the Differential Meet-In-The-Middle Cryptanalysis
|
|
0
|
120
|
September 2, 2023
|
[Resource Topic] 2023/1295: Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks
|
|
0
|
101
|
September 2, 2023
|
[Resource Topic] 2023/1292: Enhancing Data Security: A Study of Grain Cipher Encryption using Deep Learning Techniques
|
|
0
|
166
|
August 29, 2023
|
[Resource Topic] 2023/1272: Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
|
|
0
|
97
|
August 24, 2023
|
[Resource Topic] 2023/1245: Probabilistic Related-Key Statistical Saturation Cryptanalysis
|
|
0
|
81
|
August 21, 2023
|
[Resource Topic] 2023/1242: Cascading Four Round LRW1 is Beyond Birthday Bound Secure
|
|
0
|
82
|
August 21, 2023
|
[Resource Topic] 2023/1237: More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities
|
|
0
|
118
|
August 21, 2023
|
[Resource Topic] 2023/1235: LOL: A Highly Flexible Framework for Designing Stream Ciphers
|
|
0
|
102
|
August 15, 2023
|
[Resource Topic] 2023/1233: Tight Security of TNT: Reinforcing Khairallah's Birthday-bound Attack
|
|
0
|
103
|
August 15, 2023
|
[Resource Topic] 2023/1227: Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications
|
|
0
|
81
|
August 15, 2023
|
[Resource Topic] 2023/1213: Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme
|
|
0
|
82
|
August 10, 2023
|