书目详情:
Solving LPN Using Covering CodesAlgebraic Attack against Variants of McEliece with Goppa Polynomial of a Special FormBivariate Polynomials Modulo Composites and Their ApplicationsCryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)Beyond 2
c/2 Security in Sponge-Based Authenticated Encryption ModesHow to Securely Release Unverified Plaintext in Authenticated EncryptionForging Attacks on Two Authenticated Encryption Schemes COBRA and POETLow Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block CiphersScrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
A Simplified Representation of AESSimulatable Leakage: Analysis, Pitfalls, and New ConstructionsMulti-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop ComputerGLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce BiasSoft Analytical Side-Channel AttacksOn the Enumeration of Double-Base Chains with Applications to Elliptic Curve CryptographyKummer Strikes Back: New DH Speed RecordsJacobian Coordinates on Genus 2 CurvesMersenne Factorization FactoryImproving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms
评论: