|
191 |
On the Security of Split-and-Lookup-Based ZK-Friendly Primitives Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 2
|
|
|
192 |
Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 2
|
|
|
193 |
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
|
|
|
194 |
SeaFlame: Communication-Efficient Secure Aggregation for Federated Learning against Malicious Entities Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
|
|
|
195 |
Zeroed Out: Cryptanalysis of Weak PRFs in Alternating Moduli Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 2
|
|
|
196 |
A More Practical Attack Against Yoroi Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 1
|
|
|
197 |
A New Stand-Alone MAC Construct Called SMAC Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 1
|
|
|
198 |
Committing Wide Encryption Mode with Minimum Ciphertext Expansion Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 1
|
|
|
199 |
Corrigendum to Fast AES-Based Universal Hash Functions and MACs Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 1
|
|
|
200 |
Gröbner Basis Cryptanalysis of Ciminion and Hydra Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 1
|
|