Personensuche
X
?
Selected Areas in Cryptography; Lecture Notes in Computer Science ,
4
A Three-Stage MITM Attack on LowMC from a Single Plaintext-..:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
5
Impossibility of Indifferentiable Iterated Blockciphers fro..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
6
Higher-Order Masking Scheme for Trivium Hardware Implementa..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
8
Oblivious Transfer from Rerandomizable PKE:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
9
Amortizing Division and Exponentiation:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
11
Cryptanalysis of Ciminion:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
12