Sign in
CRYPTO (3)
2016
2018
2021
2023
2016
2023
Keyphrases
Publications
2023
Clément Hoffmann
,
Pierrick Méaux
,
Charles Momin
,
Yann Rotella
,
François-Xavier Standaert
,
Balazs Udvarhelyi
Learning with Physical Rounding for Linear and Quadratic Leakage Functions.
CRYPTO (3)
(2023)
Nicolas Aragon
,
Victor Dyseryn
,
Philippe Gaborit
Analysis of the Security of the PSSI Problem and Cryptanalysis of the Durandal Signature Scheme.
CRYPTO (3)
(2023)
Christof Beierle
,
Patrick Felke
,
Gregor Leander
,
Patrick P. Neumann
,
Lukas Stennes
On Perfect Linear Approximations and Differentials over Two-Round SPNs.
CRYPTO (3)
(2023)
Matilda Backendal
,
Mihir Bellare
,
Felix Günther
,
Matteo Scarlata
When Messages Are Keys: Is HMAC a Dual-PRF?
CRYPTO (3)
(2023)
Loïc Masure
,
François-Xavier Standaert
Prouff and Rivain's Formal Security Proof of Masking, Revisited - Tight Bounds in the Noisy Leakage Model.
CRYPTO (3)
(2023)
Fukang Liu
,
Lorenzo Grassi
,
Clémence Bouvier
,
Willi Meier
,
Takanori Isobe
Coefficient Grouping for Complex Affine Layers.
CRYPTO (3)
(2023)
Sebastian Berndt
,
Thomas Eisenbarth
,
Sebastian Faust
,
Marc Gourjon
,
Maximilian Orlt
,
Okan Seker
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler.
CRYPTO (3)
(2023)
Shichang Wang
,
Meicheng Liu
,
Shiqi Hou
,
Dongdai Lin
Moving a Step of ChaCha in Syncopated Rhythm.
CRYPTO (3)
(2023)
Jonathan Fuchs
,
Yann Rotella
,
Joan Daemen
On the Security of Keyed Hashing Based on Public Permutations.
CRYPTO (3)
(2023)
Solane El Hirch
,
Joan Daemen
,
Raghvendra Rohit
,
Rusydi H. Makarim
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation.
CRYPTO (3)
(2023)
Léo Ducas
,
Ludo N. Pulles
Does the Dual-Sieve Attack on Learning with Errors Even Work?
CRYPTO (3)
(2023)
Aldo Gunsing
,
Ritam Bhaumik
,
Ashwin Jha
,
Bart Mennink
,
Yaobin Shen
Revisiting the Indifferentiability of the Sum of Permutations.
CRYPTO (3)
(2023)
Léo Ducas
,
Thomas Espitau
,
Eamonn W. Postlethwaite
Finding Short Integer Solutions When the Modulus Is Small.
CRYPTO (3)
(2023)
Tianrui Wang
,
Anyu Wang
,
Xiaoyun Wang
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks.
CRYPTO (3)
(2023)
Keegan Ryan
,
Nadia Heninger
Fast Practical Lattice Reduction Through Iterated Compression.
CRYPTO (3)
(2023)
Lorenzo Grassi
,
Irati Manterola Ayala
,
Martha Norberg Hovd
,
Morten Øygarden
,
Håvard Raddum
,
Qingju Wang
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato.
CRYPTO (3)
(2023)
Tianren Liu
,
Angelos Pelecanos
,
Stefano Tessaro
,
Vinod Vaikuntanathan
Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers.
CRYPTO (3)
(2023)
Shuichi Katsumata
,
Yi-Fu Lai
,
Jason T. LeGrow
,
Ling Qin
CSI -Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist.
CRYPTO (3)
(2023)
Sonia Belaïd
,
Gaëtan Cassiers
,
Matthieu Rivain
,
Abdul Rahman Taleb
Unifying Freedom and Separation for Tight Probing-Secure Composition.
CRYPTO (3)
(2023)
Orr Dunkelman
,
Nathan Keller
,
Ariel Weizman
Practical-Time Related-Key Attack on GOST with Secret S-Boxes.
CRYPTO (3)
(2023)
Lorenzo Grassi
,
Yonglin Hao
,
Christian Rechberger
,
Markus Schofnegger
,
Roman Walch
,
Qingju Wang
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.
CRYPTO (3)
(2023)
Christina Boura
,
Nicolas David
,
Patrick Derbez
,
Gregor Leander
,
María Naya-Plasencia
Differential Meet-In-The-Middle Cryptanalysis.
CRYPTO (3)
(2023)
Clémence Bouvier
,
Pierre Briaud
,
Pyrros Chaidos
,
Léo Perrin
,
Robin Salen
,
Vesselin Velichkov
,
Danny Willems
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression Mode.
CRYPTO (3)
(2023)
Ward Beullens
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem.
CRYPTO (3)
(2023)
Wouter Castryck
,
Marc Houben
,
Simon-Philipp Merz
,
Marzio Mula
,
Sam van Buuren
,
Frederik Vercauteren
Weak Instances of Class Group Action Based Cryptography via Self-pairings.
CRYPTO (3)
(2023)
volume 14083, 2023
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III
CRYPTO (3)
14083 (2023)
2022
Iftach Haitner
,
Daniel Nukrai
,
Eylon Yogev
Lower Bound on SNARGs in the Random Oracle Model.
CRYPTO (3)
(2022)
Shujiao Cao
,
Rui Xue
The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions.
CRYPTO (3)
(2022)
Akshima
,
Siyao Guo
,
Qipeng Liu
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions.
CRYPTO (3)
(2022)
Yusuke Naito
,
Yu Sasaki
,
Takeshi Sugawara
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking.
CRYPTO (3)
(2022)
Nir Bitansky
,
Zvika Brakerski
,
Yael Tauman Kalai
Constructive Post-Quantum Reductions.
CRYPTO (3)
(2022)
John Baena
,
Pierre Briaud
,
Daniel Cabarcas
,
Ray A. Perlner
,
Daniel Smith-Tone
,
Javier A. Verbel
Improving Support-Minors Rank Attacks: Applications to Gđisplaystyle eMSS and Rainbow.
CRYPTO (3)
(2022)
Rutchathon Chairattana-Apirom
,
Lucjan Hanzlik
,
Julian Loss
,
Anna Lysyanskaya
,
Benedikt Wagner
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.
CRYPTO (3)
(2022)
Ashrujit Ghoshal
,
Ilan Komargodski
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing.
CRYPTO (3)
(2022)
Justin Holmgren
,
Minghao Liu
,
LaKyah Tyner
,
Daniel Wichs
Nearly Optimal Property Preserving Hashing.
CRYPTO (3)
(2022)
Mark Zhandry
New Constructions of Collapsing Hashes.
CRYPTO (3)
(2022)
Jeremiah Blocki
,
Blake Holman
Sustained Space and Cumulative Complexity Trade-Offs for Data-Dependent Memory-Hard Functions.
CRYPTO (3)
(2022)
Mark Zhandry
To Label, or Not To Label (in Generic Groups).
CRYPTO (3)
(2022)
Shahar P. Cohen
,
Moni Naor
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols.
CRYPTO (3)
(2022)
Nai-Hui Chia
,
Kai-Min Chung
,
Xiao Liang
,
Takashi Yamakawa
Post-quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round.
CRYPTO (3)
(2022)
Ron D. Rothblum
,
Prashant Nalini Vasudevan
Collision-Resistance from Multi-Collision-Resistance.
CRYPTO (3)
(2022)
Andre Esser
,
Alexander May
,
Javier A. Verbel
,
Weiqiang Wen
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU.
CRYPTO (3)
(2022)
Nir Bitansky
,
Sapir Freizeit
Statistically Sender-Private OT from LPN and Derandomization.
CRYPTO (3)
(2022)
André Schrottenloher
,
Marc Stevens
Simplified MITM Modeling for Permutations: New (Quantum) Attacks.
CRYPTO (3)
(2022)
Tim Beyne
,
Vincent Rijmen
Differential Cryptanalysis in the Fixed-Key Model.
CRYPTO (3)
(2022)
Federico Canale
,
Gregor Leander
,
Lukas Stennes
Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications.
CRYPTO (3)
(2022)
Cody Freitag
,
Ashrujit Ghoshal
,
Ilan Komargodski
Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions.
CRYPTO (3)
(2022)
Georgios Tsimos
,
Julian Loss
,
Charalampos Papamanthou
Gossiping for Communication-Efficient Broadcast.
CRYPTO (3)
(2022)
Christof Beierle
,
Tim Beyne
,
Patrick Felke
,
Gregor Leander
Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers.
CRYPTO (3)
(2022)
volume 13509, 2022
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III
CRYPTO (3)
13509 (2022)