1
Cover Image
2
Cover Image
3
Cover Image
Table of Contents: ... F_p^n via Multiple Local Maps -- Poseidon2: A Faster Version of the Poseidon Hash Function -- From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers -- Cryptanalysis -- The special case of cyclotomic fields in quantum algorithms for unit...

Full text 
4
Cover Image
Table of Contents: ...Symmetric-Key Cryptography -- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA -- Improved Related-Key Rectangle Attack against the Full AES-192 -- Block Ciphers Classification Based on Randomness Test Statistic...

Full text 
5
Cover Image
6
Cover Image
7
Cover Image
8
Cover Image
9
Cover Image
10
Cover Image
Table of Contents: ...Code-Based Cryptography -- Group-Action-Based Cryptography -- Isogenye-Based Cryptography -- Lattice-Based Cryptography -- Multivariate Cryptography -- Quantum Algorithms, Cryptanalysis and Models -- Post-Quantum Protocols -- Side Channel Cryptanalysis...

Full text 
11
Cover Image
Table of Contents: ...ADSC - Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis -- Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis -- Comprehensive Preimage Security Evaluations on Rijndael-based Hashing...

Full text 
12
Cover Image
Au, Man Ho
2023
Table of Contents: ... -- Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections -- Cryptanalysis -- Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs -- Linear Cryptanalysis of Lightweight Block Cipher WARP -- Linicrypt...

Full text 
13
Cover Image
Deng, Yi
2023
Table of Contents: ... -- Amortizing Division and Exponentiation -- Cryptanalysis -- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT -- Cryptanalysis of Ciminion -- Clustering Effect of Iterative Differential and Linear Trails -- Differential Cryptanalysis...

Full text 
14
Cover Image
Table of Contents: ...Cryptographic Implementations -- Quantum Cryptanalysis -- Advanced Public-Key Encryption -- Tools for Privacy-Enhancing Technologies -- Symmetric Cryptanalysis -- Multiparty Protocols -- Digital Signatures -- Fault Attacks and Side Channels -- Heuristic...

Full text 
15
Cover Image
Table of Contents: ... S-Boxes -- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications -- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher -- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes -- Lattice...

Full text 
16
Cover Image
Table of Contents: ... An application to NIST Lightweight finalists -- MILP-aided Cryptanalysis of the FUTURE Block Cipher -- Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption -- MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input -- Lightweight...

Full text 
17
Cover Image
Table of Contents: ...Cryptanalysis -- See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT -- Implicit Key-stretching Security of Encryption Schemes -- Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures -- Impossible Differential...

Full text 
18
Cover Image
Table of Contents: ...Symmetric-Key Cryptography -- Improved Differential Cryptanalysis on SPECK Using Plaintext Structures -- Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly Fp-based Ciphers -- A New Correlation Cube...

Full text 
19
Cover Image
Table of Contents: ... -- Information Set Decoding for Lee-Metric Codes using Restricted Balls -- Cryptanalysis of IvanovKroukZyablov cryptosystem ....

Full text 
20
Cover Image