Pages that link to "Item:Q2948320"
From MaRDI portal
The following pages link to Advances in Cryptology -- EUROCRYPT 2015 (Q2948320):
Displayed 30 items.
- Cryptanalysis of the Multilinear Map over the Integers (Q2948321) (← links)
- Robust Authenticated-Encryption AEZ and the Problem That It Solves (Q2948322) (← links)
- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks (Q2948323) (← links)
- A Provable-Security Analysis of Intel’s Secure Key RNG (Q2948324) (← links)
- A Formal Treatment of Backdoored Pseudorandom Generators (Q2948325) (← links)
- Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields (Q2948326) (← links)
- The Multiple Number Field Sieve with Conjugation and Generalized Joux-Lercier Methods (Q2948327) (← links)
- Better Algorithms for LWE and LWR (Q2948328) (← links)
- On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes (Q2948329) (← links)
- Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE (Q2948330) (← links)
- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro (Q2948331) (← links)
- Structural Evaluation by Generalized Integral Property (Q2948332) (← links)
- Cryptanalysis of SP Networks with Partial Non-Linear Layers (Q2948333) (← links)
- The Sum Can Be Weaker Than Each Part (Q2948334) (← links)
- SPHINCS: Practical Stateless Hash-Based Signatures (Q2948336) (← links)
- Making Masking Security Proofs Concrete (Q2948337) (← links)
- Ciphers for MPC and FHE (Q2948338) (← links)
- Verified Proofs of Higher-Order Masking (Q2948340) (← links)
- Inner Product Masking Revisited (Q2948341) (← links)
- Fully Homomophic Encryption over the Integers Revisited (Q2948342) (← links)
- (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces (Q2948343) (← links)
- KDM-CCA Security from RKA Secure Authenticated Encryption (Q2948344) (← links)
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks (Q2948345) (← links)
- FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second (Q2948346) (← links)
- Bootstrapping for HElib (Q2948347) (← links)
- More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries (Q2948348) (← links)
- How to Efficiently Evaluate RAM Programs with Malicious Security (Q2948351) (← links)
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function (Q2948353) (← links)
- Twisted Polynomials and Forgery Attacks on GCM (Q2948354) (← links)
- Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices (Q2948355) (← links)