Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery Qianqian YangLing SongJian Weng Research Article 10 April 2024 Article: 19
Bitcoin as a Transaction Ledger: A Composable Treatment Christian BadertscherUeli MaurerVassilis Zikas Research Article Open access 04 April 2024 Article: 18
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates Aggelos KiayiasFeng-Hao LiuYiannis Tselekounis Research Article Open access 03 April 2024 Article: 17
Bandwidth-Hard Functions: Reductions and Lower Bounds Jeremiah BlockiPeiyuan LiuSamson Zhou Research Article 12 March 2024 Article: 16
The COLM Authenticated Encryption Scheme Elena AndreevaAndrey BogdanovKan Yasuda Research Article 07 March 2024 Article: 15
Collision Resistance from Multi-collision Resistance Ron D. RothblumPrashant Nalini Vasudevan Research Article Open access 06 March 2024 Article: 14
Entropy Computation for Oscillator-based Physical Random Number Generators David LubiczViktor Fischer Research Article Open access 29 February 2024 Article: 13
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting Dennis HofheinzJessica KochChristoph Striecks Research Article Open access 29 February 2024 Article: 12
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm Dmitrii Koshelev Research Article 27 February 2024 Article: 11
Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions AkshimaSiyao GuoQipeng Liu Research Article 13 February 2024 Article: 10
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3 Marc FischlinFelix GüntherChristian Janson Research Article Open access 30 January 2024 Article: 9