Classical Leakage Resilience from Fault-Tolerant Quantum Computation Felipe G. LacerdaJoseph M. RenesRenato Renner OriginalPaper 08 August 2019 Pages: 1071 - 1094
White-Box Cryptography: Don’t Forget About Grey-Box Attacks Estuardo Alpirez BockJoppe W. BosAlexander Treff OriginalPaper 12 February 2019 Pages: 1095 - 1143
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model Carmit HazayAvishay Yanai OriginalPaper 23 April 2019 Pages: 1144 - 1199
What Security Can We Achieve Within 4 Rounds? Carmit HazayMuthuramakrishnan Venkitasubramaniam OriginalPaper 22 May 2019 Pages: 1200 - 1262
Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version Alexandre DucSebastian FaustFrançois-Xavier Standaert OriginalPaper 12 January 2018 Pages: 1263 - 1297
Updating Key Size Estimations for Pairings Razvan BarbulescuSylvain Duquesne OriginalPaper 29 January 2018 Pages: 1298 - 1336
Small CRT-Exponent RSA Revisited Atsushi TakayasuYao LuLiqiang Peng OriginalPaper 22 February 2018 Pages: 1337 - 1382
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64 Yosuke TodoGregor LeanderYu Sasaki OriginalPaper 02 April 2018 Pages: 1383 - 1422
Cryptanalysis of NORX v2.0 Colin ChaigneauThomas FuhrJean-René Reinhard OriginalPaper 06 June 2018 Pages: 1423 - 1447
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications Itai DinurOrr DunkelmanAdi Shamir OriginalPaper 21 August 2018 Pages: 1448 - 1490
Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption Tatsuaki OkamotoKatsuyuki Takashima OriginalPaper Open access 04 December 2018 Pages: 1491 - 1573