Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64 (Englisch)
- Neue Suche nach: Wang, Feifan
- Neue Suche nach: Wang, Gaoli
- Neue Suche nach: Wang, Feifan
- Neue Suche nach: Wang, Gaoli
In:
Applied cryptography and network security
; 792-808
;
2022
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64
-
Beteiligte:Wang, Feifan ( Autor:in ) / Wang, Gaoli ( Autor:in )
-
Kongress:ACNS ; 20. ; 2022 ; Rom
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2022
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.8
- Weitere Informationen zu Dewey Decimal Classification
-
Schlagwörter:
-
Klassifikation:
DDC: 005.8 -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Keyed-Fully Homomorphic Encryption Without Indistinguishability ObfuscationSato, Shingo / Emura, Keita / Takayasu, Atsushi et al. | 2022
- 24
-
A Performance Evaluation of Pairing-Based Broadcast Encryption SystemsChhatrapati, Arush / Hohenberger, Susan / Trombo, James / Vusirikala, Satyanarayana et al. | 2022
- 45
-
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More VersatileZhao, Liang / Chen, Ze / Chen, Liqun / Huang, Xinyi et al. | 2022
- 67
-
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-BeetleInoue, Akiko / Iwata, Tetsu / Minematsu, Kazuhiko et al. | 2022
- 85
-
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort DeauthenticationShrestha, Prakash / Saxena, Nitesh et al. | 2022
- 105
-
ZLeaks: Passive Inference Attacks on Zigbee Based Smart HomesShafqat, Narmeen / Dubois, Daniel J. / Choffnes, David / Schulman, Aaron / Bharadia, Dinesh / Ranganathan, Aanjhan et al. | 2022
- 126
-
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search SchemesDijkslag, Marco / Damie, Marc / Hahn, Florian / Peter, Andreas et al. | 2022
- 147
-
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting TechniquesLiu, Zengrui / Shrestha, Prakash / Saxena, Nitesh et al. | 2022
- 170
-
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process KnowledgeEsquivel-Vargas, Herson / Castellanos, John Henry / Caselli, Marco / Tippenhauer, Nils Ole / Peter, Andreas et al. | 2022
- 193
-
RSA Key Recovery from Digit Equivalence InformationChuengsatiansup, Chitchanok / Feutrill, Andrew / Sim, Rui Qi / Yarom, Yuval et al. | 2022
- 212
-
Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number GeneratorsMartinez, Florette et al. | 2022
- 230
-
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key BridgesHadipour, Hosein / Eichlseder, Maria et al. | 2022
- 253
-
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round TripGünther, Felix / Rastikian, Simon / Towa, Patrick / Wiggers, Thom et al. | 2022
- 273
-
Improving the Privacy of Tor Onion ServicesEaton, Edward / Sasy, Sajin / Goldberg, Ian et al. | 2022
- 293
-
Privacy-Preserving Authenticated Key Exchange for Constrained DevicesFerreira, Loïc et al. | 2022
- 313
-
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting ProtocolsPankova, Alisa / Willemson, Jan et al. | 2022
- 337
-
An Approach to Generate Realistic HTTP Parameters for Application Layer DeceptionSahin, Merve / Hébert, Cédric / Cabrera Lozoya, Rocio et al. | 2022
- 356
-
IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS ProtocolSun, Yue / Lv, Shichao / You, Jianzhou / Sun, Yuyan / Chen, Xin / Zheng, Yaowen / Sun, Limin et al. | 2022
- 376
-
Probing for Passwords - Privacy Implications of SSIDs in Probe RequestsAnsohn McDougall, Johanna / Burkert, Christian / Demmler, Daniel / Schwarz, Monina / Hubbe, Vincent / Federrath, Hannes et al. | 2022
- 399
-
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-LinkingArfaoui, Ghada / Fouque, Pierre-Alain / Jacques, Thibaut / Lafourcade, Pascal / Nedelcu, Adina / Onete, Cristina / Robert, Léo et al. | 2022
- 419
-
Don’t Tamper with Dual System EncryptionYuen, Tsz Hon / Zhang, Cong / Chow, Sherman S. M. et al. | 2022
- 440
-
Progressive and Efficient Verification for Digital SignaturesBoschini, Cecilia / Fiore, Dario / Pagnin, Elena et al. | 2022
- 459
-
Revocable Hierarchical Attribute-Based Signatures from LatticesGardham, Daniel / Manulis, Mark et al. | 2022
- 480
-
Covert Authentication from LatticesKumar, Rajendra / Nguyen, Khoa et al. | 2022
- 501
-
Spreading the Privacy Blanket:Gordon, Dov / Katz, Jonathan / Liang, Mingyu / Xu, Jiayu et al. | 2022
- 521
-
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret EncapsulationBossuat, Jean-Philippe / Troncoso-Pastoriza, Juan / Hubaux, Jean-Pierre et al. | 2022
- 542
-
(Commit-and-Prove) Predictable Arguments with PrivacyKhoshakhlagh, Hamidreza et al. | 2022
- 565
-
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest MajoritiesEldefrawy, Karim / Lepoint, Tancrède / Leroux, Antonin et al. | 2022
- 585
-
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical FunctionsYing, Jason H. M. / Cao, Shuwei / Poh, Geong Sen / Xu, Jia / Lim, Hoon Wei et al. | 2022
- 605
-
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFAPhalakarn, Kittiphop / Attrapadung, Nuttapong / Matsuura, Kanta et al. | 2022
- 626
-
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user SecurityBadrinarayanan, Saikrishna / Masny, Daniel / Mukherjee, Pratyay et al. | 2022
- 643
-
Efficient Two-Party Exponentiation from Quotient TransferLu, Yi / Hara, Keisuke / Ohara, Kazuma / Schuldt, Jacob / Tanaka, Keisuke et al. | 2022
- 663
-
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPCAttema, Thomas / Dunning, Vincent / Everts, Maarten / Langenkamp, Peter et al. | 2022
- 684
-
How Byzantine is a Send Corruption?Eldefrawy, Karim / Loss, Julian / Terner, Ben et al. | 2022
- 707
-
Babel Fees via Limited LiabilitiesChakravarty, Manuel M. T. / Karayannidis, Nikos / Kiayias, Aggelos / Peyton Jones, Michael / Vinogradova, Polina et al. | 2022
- 727
-
FAST: Fair Auctions via Secret TransactionsDavid, Bernardo / Gentile, Lorenzo / Pourpouneh, Mohsen et al. | 2022
- 748
-
Astrape: Anonymous Payment Channels with Boring CryptographyDong, Yuhao / Goldberg, Ian / Gorbunov, Sergey / Boutaba, Raouf et al. | 2022
- 771
-
A White-Box Speck Implementation Using Self-equivalence EncodingsVandersmissen, Joachim / Ranea, Adrián / Preneel, Bart et al. | 2022
- 792
-
Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64Wang, Feifan / Wang, Gaoli et al. | 2022
- 809
-
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck DistinguisherBăcuieți, Norica / Batina, Lejla / Picek, Stjepan et al. | 2022
- 833
-
Carry-Less to BIKE FasterChen, Ming-Shing / Güneysu, Tim / Krausz, Markus / Thoma, Jan Philipp et al. | 2022
- 853
-
Faster Kyber and Dilithium on the Cortex-M4Abdulrahman, Amin / Hwang, Vincent / Kannwischer, Matthias J. / Sprenkels, Amber et al. | 2022
- 872
-
Quantum-Resistant Software Update Security on Low-Power Networked Embedded DevicesBanegas, Gustavo / Zandberg, Koen / Baccelli, Emmanuel / Herrmann, Adrian / Smith, Benjamin et al. | 2022
- 892
-
Post-quantum ID-Based Ring Signatures from Symmetric-Key PrimitivesBuser, Maxime / Liu, Joseph K. / Steinfeld, Ron / Sakzad, Amin et al. | 2022