1
Cheon, Jung Hee
2016
Table of Contents:
“...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...”2016
Full text
2
Cheon, Jung Hee
2016
Table of Contents:
“...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...”2016
Full text
3
Lange, Tanja.
2014
Table of Contents:
“... Search for Quadratic Systems in F2 on FPGAs -- Faster Hash-based Signatures with Bounded Leakage -- White-Box Security Notions for Symmetric Encryption Schemes -- Two Attacks on a White-Box AES Implementation -- Extended Generalized Feistel Networks using...”2014
Full text
4
Sarkar, Palash.
2014
Table of Contents:
“... -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation....”2014
Full text
5
Sarkar, Palash.
2014
Table of Contents:
“... -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation....”2014
Full text
6
Pointcheval, David.
2014
Table of Contents:
“... S-Boxes in Hardware by Utilizing Linear Transformations -- Efficient Masked S-Boxes Processing – A Step Forward -- A More Efficient AES Threshold Implementation -- Protocols -- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum...”2014
Full text
7
Boyd, Colin.
2013
Table of Contents:
“... Unknown Divisors -- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem -- Black-Box Separations and their Adaptability to the Non-Uniform Model -- Injective Encodings to Elliptic Curves -- Membership Encryption and Its...”2013
Full text
8
Manulis, Mark.
2012
Table of Contents:
“...Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory....”2012
Full text