Folgen
Carlos Cid
Carlos Cid
Simula UiB and Okinawa Institute of Science and Technology
Bestätigte E-Mail-Adresse bei simula.no - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Boomerang connectivity table: a new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1922018
Small scale variants of the AES
C Cid, S Murphy, MJB Robshaw
International Workshop on Fast Software Encryption, 145-162, 2005
1702005
On the complexity of the BKW algorithm on LWE
MR Albrecht, C Cid, JC Faugere, R Fitzpatrick, L Perret
Designs, Codes and Cryptography 74, 325-354, 2015
1512015
Algebraic techniques in differential cryptanalysis
M Albrecht, C Cid
International Workshop on Fast Software Encryption, 193-208, 2009
1362009
Algebraic aspects of the advanced encryption standard
C Cid, S Murphy, M Robshaw
Springer Science & Business Media, 2006
1292006
An analysis of the XSL algorithm
C Cid, G Leurent
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
1262005
Multi-client non-interactive verifiable computation
SG Choi, J Katz, R Kumaresan, C Cid
Theory of Cryptography Conference, 499-518, 2013
1192013
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
MR Albrecht, C Cid, L Grassi, D Khovratovich, R Lüftenegger, ...
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
822019
The eSTREAM portfolio
S Babbage, C Canniere, A Canteaut, C Cid, H Gilbert, T Johansson, ...
eSTREAM, ECRYPT Stream Cipher Project, 1-6, 2008
812008
An efficient toolkit for computing private set operations
A Davidson, C Cid
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
712017
On weak keys and forgery attacks against polynomial-based MAC schemes
G Procter, C Cid
Journal of Cryptology 28 (4), 769-795, 2015
692015
Algebraic algorithms for LWE problems
M Albrecht, C Cid, JC Faugere, R Fitzpatrick, L Perret
692014
The MAPLE Package “Janet”: I. Polynomial Systems
YA Blinkov, CF Cid, VP Gerdt, W Plesken, D Robertz
Proc. of Computer Algebra in Scientific Computing CASC, 31-40, 2003
682003
Classic McEliece
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
NIST Post-Quantum Cryptography Standardization Project (Round 3), 2020
662020
Cold boot key recovery by solving polynomial systems with noise
M Albrecht, C Cid
Applied Cryptography and Network Security: 9th International Conference …, 2011
602011
A security analysis of Deoxys and its internal tweakable block ciphers
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
IACR Transactions on Symmetric Cryptology, 73-107, 2017
572017
Classic McEliece: conservative code-based cryptography
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
492022
ECRYPT II yearly report on algorithms and keysizes (2011–2012)
N Smart, S Babbage, D Catalano, C Cid, B Weger, O Dunkelman, M Ward
European network of excellence in cryptology (ECRYPT II), 2012
482012
Are we compromised? Modelling security assessment games
V Pham, C Cid
International Conference on Decision and Game Theory for Security, 234-247, 2012
472012
Strategic discovery and sharing of vulnerabilities in competitive environments
MHR Khouzani, V Pham, C Cid
Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014
422014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20