Stebėti
Carlos Cid
Carlos Cid
Simula UiB and Okinawa Institute of Science and Technology
Patvirtintas el. paštas simula.no - Pagrindinis puslapis
Pavadinimas
Cituota
Cituota
Metai
Boomerang connectivity table: A new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
2392018
Small scale variants of the AES
C Cid, S Murphy, MJB Robshaw
International Workshop on Fast Software Encryption, 145-162, 2005
1832005
On the complexity of the BKW algorithm on LWE
MR Albrecht, C Cid, JC Faugere, R Fitzpatrick, L Perret
Designs, Codes and Cryptography 74, 325-354, 2015
1592015
Algebraic techniques in differential cryptanalysis
M Albrecht, C Cid
International Workshop on Fast Software Encryption, 193-208, 2009
1442009
Algebraic aspects of the advanced encryption standard
C Cid, S Murphy, M Robshaw
Springer Science & Business Media, 2006
1352006
An analysis of the XSL algorithm
C Cid, G Leurent
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
1342005
Multi-client non-interactive verifiable computation
SG Choi, J Katz, R Kumaresan, C Cid
Theory of Cryptography Conference, 499-518, 2013
1192013
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
MR Albrecht, C Cid, L Grassi, D Khovratovich, R Lüftenegger, ...
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
1012019
Classic mceliece
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
National Institute of Standards and Technology, Tech. Rep, 2020
932020
An efficient toolkit for computing private set operations
A Davidson, C Cid
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
912017
The eSTREAM portfolio
S Babbage, C Canniere, A Canteaut, C Cid, H Gilbert, T Johansson, ...
eSTREAM, ECRYPT Stream Cipher Project, 1-6, 2008
812008
Algebraic algorithms for LWE problems
M Albrecht, C Cid, JC Faugère, R Fitzpatrick, L Perret
772014
The MAPLE Package “Janet”: I. Polynomial Systems
YA Blinkov, CF Cid, VP Gerdt, W Plesken, D Robertz
Proc. of Computer Algebra in Scientific Computing CASC, 31-40, 2003
742003
On weak keys and forgery attacks against polynomial-based MAC schemes
G Procter, C Cid
Journal of Cryptology 28 (4), 769-795, 2015
712015
Classic McEliece: conservative code-based cryptography
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
672022
A security analysis of Deoxys and its internal tweakable block ciphers
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
IACR Transactions on Symmetric Cryptology, 73-107, 2017
662017
Cold boot key recovery by solving polynomial systems with noise
M Albrecht, C Cid
Applied Cryptography and Network Security: 9th International Conference …, 2011
632011
ECRYPT II yearly report on algorithms and keysizes (2011–2012)
N Smart, S Babbage, D Catalano, C Cid, B Weger, O Dunkelman, M Ward
European network of excellence in cryptology (ECRYPT II), 2012
492012
Are we compromised? Modelling security assessment games
V Pham, C Cid
International Conference on Decision and Game Theory for Security, 234-247, 2012
472012
Algebraic algorithms for LWE
MR Albrecht, C Cid, JC Faugère, L Perret
Cryptology ePrint Archive, 2014
452014
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20