Improved Differential-Linear Attacks with Applications to ARX Ciphers Christof BeierleMarek BrollYosuke Todo Research Article 12 October 2022 Article: 29
The Inverse of \(\chi \) and Its Applications to Rasta-Like Ciphers Fukang LiuSantanu SarkarTakanori Isobe Research Article 04 October 2022 Article: 28
Efficient Perfectly Secure Computation with Optimal Resilience Ittai AbrahamGilad AsharovAvishay Yanai Research Article 27 September 2022 Article: 27
Signed (Group) Diffie–Hellman Key Exchange with Tight Security Jiaxin PanChen QianMagnus Ringerud Research Article Open access 27 September 2022 Article: 26
On the (in)Security of ROS Fabrice BenhamoudaTancrède LepointMariana Raykova Research Article 15 September 2022 Article: 25
Breaking the Decisional Diffie–Hellman Problem for Class Group Actions Using Genus Theory: Extended Version Wouter CastryckJana SotákováFrederik Vercauteren Research Article 15 September 2022 Article: 24
ZK-PCPs from Leakage-Resilient Secret Sharing Carmit HazayMuthuramakrishnan VenkitasubramaniamMor Weiss Research Article 25 July 2022 Article: 23