Stop the war!
Остановите войну!
for scientists:
default search action
13th AFRICACRYPT 2022: Fes, Morocco
- Lejla Batina, Joan Daemen:
Progress in Cryptology - AFRICACRYPT 2022: 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18-20, 2022, Proceedings. Lecture Notes in Computer Science 13503, Springer Nature Switzerland 2022, ISBN 978-3-031-17433-9 - Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta:
Construction of Recursive MDS Matrices Using DLS Matrices. 3-27 - Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta:
FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix. 28-52 - Andrea Caforio, Daniel Collins, Subhadeep Banik, Francesco Regazzoni:
A Small GIFT-COFB: Lightweight Bit-Serial Architectures. 53-77 - Olivier Blazy, Saqib A. Kakvi:
Identity-Based Encryption in DDH Hard Groups. 81-102 - Marloes Venema, Greg Alpár:
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks. 103-129 - Raghvendra Rohit, Santanu Sarkar:
Cryptanalysis of Reduced Round SPEEDY. 133-149 - Loïc Rouquette, David Gérault, Marine Minier, Christine Solnon:
And Rijndael?: Automatic Related-Key Differential Analysis of Rijndael. 150-175 - Christina Boura, Rachelle Heim Boissier, Yann Rotella:
Breaking Panther. 176-188 - Muzhou Li, Ling Sun, Meiqin Wang:
Automated Key Recovery Attacks on Round-Reduced Orthros. 189-213 - Joppe W. Bos, Joost Renes, Amber Sprenkels:
Dilithium for Memory Constrained Devices. 217-235 - Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma:
Lattice-Based Inner Product Argument. 236-268 - Ruben Niederhagen, Johannes Roth, Julian Wälde:
Streaming SPHINCS+ for Embedded Devices Using the Example of TPMs. 269-291 - Bénédikt Tran, Serge Vaudenay:
Solving the Learning Parity with Noise Problem Using Quantum Algorithms. 295-322 - Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier A. Verbel:
An Estimator for the Hardness of the MQ Problem. 323-347 - Thomas Aulbach, Tobias Kovats, Juliane Krämer, Soundes Marzougui:
Recovering Rainbow's Secret Key with a First-Order Fault Attack. 348-368 - Suvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay:
TransNet: Shift Invariant Transformer Network for Side Channel Analysis. 371-396 - Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA. 397-421 - Mónica P. Arenas, Muhammed Ali Bingöl, Hüseyin Demirci, Georgios Fotiadis, Gabriele Lenzini:
A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption. 425-447 - Rikuo Haga, Yu-ichi Hayashi, Daiki Miyahara, Takaaki Mizuki:
Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards. 448-468 - Marc Fischlin, Felix Rohrbach, Tobias Schmalz:
A Random Oracle for All of Us. 469-489 - Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sýs, Vashek Matyas:
DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits. 493-517 - Youssef El Housni, Aurore Guillevic, Thomas Piellard:
Co-factor Clearing and Subgroup Membership Testing on Pairing-Friendly Curves. 518-536 - Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A Generalized Attack on the Multi-prime Power RSA. 537-549 - Laila El Aimani:
Finding Low-Weight Polynomial Multiples Using the Rho Method. 550-575 - Jinzheng Cao, Qingfeng Cheng, Jian Weng:
EHNP Strikes Back: Analyzing SM2 Implementations. 576-600
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.